<<

ISSN 2334-3745

Volume XIV, Issue 1 February 2020 PERSPECTIVES ON Volume 14, Issue 1

Table of Contents Welcome from the Editors...... 1 Articles

Detecting Future ‘Marawis’: Considering Alternative Indicators for Assessing the Potential for New Manifestations of Violent Extremism in ...... 3 by Franco

The Threat of Transnational Terrorist Groups in ...... 13 by Abhinav Pandya

Research Notes

Learning in a Double Loop: The Strategic Transformation of Al-Qaeda...... 26 by Michael Fürstenberg and Carolin Görzig

Brain and Body “Fingerprints” of Existential Anxiety and their Relevance for the Identification of Potential Terrorists...... 39 by Linda Wendelberg

A New Inventory of 30 Terrorism Databases and Data Sets...... 54 by Neil G. Bowie

Online Deceptions: Renegotiating Gender Boundaries on ISIS Telegram...... 67 by Meili Criezis

Resources

Handbook of Terrorism and Counter Terrorism Post 9/11, edited by David M. Jones, Paul Schulte, Carl Ungerer, and M.R. Smith. Cheltenham, Glos.: Edward Elgar, 2019...... 74 Reviewed by Alex P. Schmid

Counterterrorism Bookshelf: 62 Books on Terrorism & Counter-Terrorism-Related Subjects...... 76 Reviewed by Joshua Sinai

Bibliography: Deradicalization...... 92 Compiled and selected by Judith Tinnes

Bibliography: Terrorism by Country – ...... 132 Compiled and selected by Judith Tinnes

Recent Online Resources for the Analysis of Terrorism and Related Subjects...... 155 Compiled and selected by Berto Jongman

M.A. and Ph.D. Theses on Terrorism and Sectarianism...... 191 Compiled and selected by Brody C. McDonald

ISSN 2334-3745 I February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Conference Calendar ...... 196 Compiled and selected by Olivia Kearney

Announcements

TRI Thesis Award Information...... 204

Words of Appreciation...... 205

About Perspectives on Terrorism...... 206

ISSN 2334-3745 II February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Words of Welcome from the Editors

Dear Reader,

We are pleased to announce the release of Volume XIV, Issue 1 (February 2020) of Perspectives on Terrorism (PoT – ISSN 2334-3745). Our free and independent online journal is a publication of the Terrorism Research Initiative (TRI), Vienna, and the Institute of Security and Global Affairs (ISGA) of Leiden University’s Campus in The Hague. All PoT issues are available athttps://ww w.universiteitleiden.nl/perspectives-on-terrorism and indexed by JSTOR, SCOPUS, and GoogleScholar.

Now in its fourteenth year, Perspectives on Terrorism has nearly 8,900 registered subscribers and many more occasional readers and website visitors worldwide. The Articles of its six annual issues are fully peer-reviewed by external referees while its Research and Policy Notes, Special Correspondence, Resources and other content are subject to internal editorial quality control.

Here is a brief look at the contents of the current issue. The first research article, by Joseph Franco, draws lessons from the 2017 Battle for in the that can help identify alternative measures to detect sources of violent extremism, such as the responsiveness of local governments, poverty levels, and the effectiveness of educational institutions. Next, Abhinav Pandya examines how Kashmir is becoming increasingly vulnerable to the influence and operations of transnational terrorist groups. B oth articles are based on in-depth field research.

The Articles section is followed by four Research Notes. In the first of these, Michael Fürstenberg and Carolin Görzig apply a conceptual framework of organizational learning to explain the strategic evolution of jihadist groups, particularly Al-Qaeda and Hay’at Tahrir al-Sham. Next, Linda Wendelberg examines whether the psychological condition known as Existential Anxiety could be a risk factor in radicalization processes. Neil Bowie follows with a Research Note describing 30 new databases on terrorism. And this section concludes with a Research Note by Meili Criezis, examining the ways in which Islamic State supporters on Telegram, an encrypted messaging application, renegotiate gender boundaries.

The Resource section begins with a book review by Alex Schmid of the recently published Handbook of Terrorism and Counter Terrorism Post 9/11. Then Joshua Sinai presents more than 60 books by listing their tables of contents, while Associate Editor Judith Tinnes continues her series of extensive hand-searched bibliographies with one on deradicalisation research, and another on terrorism and Iran. These are followed by Associate Editor Berto Jongman’s regular survey of new web-based resources on terrorism and related subjects. Brody McDonald (who has taken over the journal’s theses surveys from Ryan Scrivens) provides a list of M.A. and Ph.D. theses on terrorism, violent extremism and nationalism, followed by an overview of recent and upcoming conferences, symposia and workshops on terrorism-related subjects by Olivia Kearney (who temporarily took over the work of Reinier Bergema for this section).

Finally, the February issue concludes with an announcement about the annual TRI ThesisA ward for the Best Doctoral Dissertation on Terrorism and/or Counter-Terrorism, and a separate Words of Appreciation to all the peer reviewers, Editorial Board members and Editorial Team of Perspectives on Terrorism for another successful year as evidenced by its place among the top three journals in the field:

ISSN 2334-3745 1 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Comparison of Peer Reviewed Journals in Terrorism Studies (Google Scholar Feb. 14, 2020)

Publication h5-index h5-median Studies in Conflict and Terrorism 32 51 Terrorism and Political Violence 31 48 Perspectives on Terrorism 26 52 The current issue ofPerspectives on Terrorism has been put together by Co-Editor James Forest and Editor-in- Chief, Alex P. Schmid, with the support of Associate Editor for IT Christine Boelema Robertus, and with the help of Editorial Assistant Jodi Moore. The next issue of the journal is tentatively scheduled as a Special Issue on terrorism in the North Caucasus region, guest edited by Julie Wilhelmsen from the Norwegian Institute of International Affairs.

ISSN 2334-3745 2 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Detecting Future ‘Marawis’: Considering Alternative Indicators for Assessing the Potential for New Manifestations of Violent Extremism in Mindanao by Joseph Franco

Abstract The 2017 Battle for Marawi was the proverbial perfect storm—the (MG) and its allies were opportunistic actors who exploited the violent milieu provided by the city. Marawi’s prevailing insecurity, its built environment, and alienated population coalesced into a setting conducive for the protracted battle. What are the potential indicators that could detect future ‘Marawis’? This article highlights the need to identify alternative measures to detect sources of violent extremism in Mindanao. Greater foresight could be obtained by observing proxy indicators such as the responsiveness of local governments, poverty levels, and the effectiveness of educational institutions. Based on field visits conducted for this article, the hinterlands of Maguindanao may be the most likely enclave for new MG-style groups. Keywords: Mindanao, Terrorism, Philippines, Countering Violent Extremism, Counter-terrorism

Introduction

The 2017 Battle for Marawi was the proverbial perfect storm—the so-called Maute Group (MG) and its allies were opportunistic actors who exploited the violent milieu provided by the city. Fighting in the Islamic city of Marawi erupted on 23 May 2017 after an operation was launched by the Armed Forces of the Philippines (AFP) special operations forces (SOF) to capture , the leader of Islamic State-pledged (IS) in Mindanao. What was planned as a swift raid transformed into a confused running gun battle against hundreds of Maute Group (MG) members, other Filipino militants, and foreign terrorist fighters. The raid preempted the MG’s plan to take over Marawi on 26 May 2017. Months before the siege, the MG had planned to time their attack to coincide with the start of the holy month of Ramadan. After five months of fighting, no more than a dozen of the original 200 or so MG fighters survived. However, similar groups may yet emerge even after the demise of the MG leadership. Given the possibility of a resurgence among jihadist-inspired groups, what are the potential indicators that could detect future ‘Marawis’? Reliance on security sector-measures such as the number of previous violent incidents has only limited early-warning utility. It may be more productive to look at other indicators such as the responsiveness of local government units, poverty levels, and the effectiveness of educational institutions. Based on an initial assessment of potential proxy indicators for violent extremism and field visits to Mindanao, the hinterlands of Maguindanao may be the most likely enclave for new MG-style groups. It is unlikely that another urban centre in Mindanao would experience a protracted battle like the one in Marawi. However, the presence of un- and mis-governed spaces populated by an organised armed and/or criminal group can be a viable recruitment site for foreign terrorist fighters (FTFs) and other violent extremist organisations (VEOs). There remains the possibility of a VEO similar to the MG emerging in the so-called ‘SPMS Box’ (see figure 1 below) in the Maguindanao province. The ‘SPMS Box’ is a 10,000-hectare subregion in Maguindanao province named after the municipalities of Shariff Aguak, Pagatin, Mamasapano, and Datu Salibo.

Methodology This article intends to shed light on often-overlooked issues, aside from ideological explanations, which contribute to the emergence and persistence of VEOs. During several research trips to Mindanao cities and

ISSN 2334-3745 3 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 municipalities, 30 subject-matter experts were interviewed by the author. Field visits covered the provinces of Misamis Oriental (Cagayan de Oro City), Lanao del Norte (Iligan City), (the Islamic City of Marawi and municipality), and Maguindanao. Sites visited include the heavily damaged city of Marawi; the abandoned Butig municipal hall; the ancestral home of the Maute clan; and Cotabato City, the de facto capital of the new BARMM.

Background More than two years after the Battle for Marawi, over 100,000 internally displaced persons (IDPs) are still barred from returning to the city.[1] Frustration over the slow pace of Marawi’s rehabilitation has raised concerns that the devastated city may become a symbol for terrorist recruitment not just in the province of Lanao del Sur but also across Mindanao.[2] Zachary Abuza has even remarked that need not look far as botching the rebuilding effort meant “[the] next Marawi will be Marawi.”[3] Map 1: BARMM

(Source: Benar News) Hopes for peace in Mindanao are now pinned on the 80-persons strong Transition Authority (BTA). On March 29, 2019, the new Bangsamoro Autonomous Region of Muslim Mindanao (BARMM) inaugurated the BTA to take on legislative and executive functions. Under the BARMM, conflict-affected areas were granted enhanced political autonomy and given economic resources to address long-standing issues exploited by VEOs. It was the culmination of a decades-long peace process with the Moro Islamic Liberation Front (MILF), a group that originally sought to carve out an independent state in Muslim Mindanao. There are two sets of hurdles for the effective implementation to the BARMM. In the short-term, optimism over the ability of the BARMM to deliver results has waned. Implementing guidelines covering the hiring of civil servants, budgeting, and the awarding of contracts is not yet finalised. Lack of clarity over the day-to-day operations of the regional government could stymie much-needed socio-economic interventions. In the long- term, the BARMM needs to confront the persistent challenges of local corruption and illicit economies. The dominance of political clans in Mindanao is the manifestation of such local-level dysfunctions. The 2019 Philippine midterm elections saw the continuity of dynastic politics, including the use of violence.

ISSN 2334-3745 4 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

While Mindanao was under martial law, this had not dissuaded clans from ‘business-as-usual’—committing illegal acts during the campaign and the polling periods. Even Marawi itself reported brazen vote-buying activities months before the plebiscite that ratified the establishment of the BARMM.[4] Explosions rocked Maguindanao province and Cotabato City on the of the plebiscite.[5] Also documented were reports of vote-counting machines either being tampered with or destroyed.[6]

Marawi and the Rise of the Maute Clan Prior to the Marawi siege, the city was considered as one of the centres of illicit economic activity in Mindanao. [7] The purported exclusivist mindset of the Maranaos residing in Marawi foiled the ability of local law enforcement to build trusting partnerships with its residents.[8] When fighting began in the Marawi’s suburbs, local community leaders initially rebuffed assistance from the military; stressing that Maranao problems could only be solved by Maranaos. This sentiment even extended to the widespread belief among Marawi’s displaced residents that military forces deliberately razed and looted the city.[9] The recurring narrative among the internally displaced persons (IDPs) from Marawi is about how “Manila destroyed Marawi.”[10] High levels of criminality in the city also resulted in a built environment where families kept arms caches and fortifications. [11] Map 2: Lanao del Sur Province

(Source: Wikimedia Commons)

ISSN 2334-3745 5 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Local government officials initially thought that the Maute clan was just bringing in illicit wealth for safekeeping within the city and allegedly tolerated the entry of the MG leadership, specifically the Maute brothers and Abdullah.[12] Aside from financial considerations, Marawi’s former mayors facilitated the entry of the MG. Brothers Pre and Solitario Salic who were engaged in a rido [clan war] with the incumbent vice governor of Lanao del Sur province, Bombit Adiong. Adiong was able to convince the brigade commander to put pressure on the rival Salic clan. In turn, the Salic clan sought help from their Maute clan relatives in the neighbouring town of Butig.[13] The evolution of the MG is emblematic of how local conflicts from the provincial to the village level can lead to the emergence of groups like the Islamic State-linked (IS) MG. The MG mimicked IS imagery to differentiate itself from other clans’ private armies.[14] Before 2016, the MG started as a private militia of the Romato and Maute clans in the Lanao del Sur province. Abdullah and Omar Maute, scions of the Maute clan, took an extremist turn when the clan’s favoured candidate lost the mayoral post in Butig municipality. Butig became associated with the terrorist group after a series of military offensives in late 2016. Troops from the Philippine Army’s 49th Infantry Battalion (49IB) now occupy Butig—the birthplace of the MG. Prior to this escalation, the then-unnamed MG was a private militia for the clan headed by its matriarch Farhana Maute, intimidating other clans that contested it in local elections in the province.[15] Clansmen used coercion to mobilise votes and extort contractors involved in public works projects.[16] In 2016, the MG gained public notoriety after having raised a black flag associated with IS in the abandoned old municipal hall of Butig. What began as an attempt to intimidate local rivals caught the attention of IS-linked personalities beyond the Philippines.[17] This show of force was prompted by the loss of the Maute clan’s favoured candidate for the mayoralty of Butig and the subsequent disruption of illicit financing.[18] What became known only more recently was that the origins of the MG as a militia goes back to a specific clan crisis. Farhana Maute entered the clan into a pyramid scheme in 2012, seeking to launder funds it obtained after skimming off funds from government infrastructure projects. However, the venture failed. For the MG, the combination of financial and electoral losses meant the collapse of a decades-long network of patronage. To protect itself from loan sharks, the clan organised in 2015 an armed group as a “defence measure” in 2015. [19] Had they not taken up arms and organised a militia, the Maute clan would have been very vulnerable to a rido waged by their creditors.

The Maute Group During and After the Battle for Marawi The destruction of the MG as an organised armed group came in the wake of the Battle for Marawi. After five months of fighting, no more than a dozen of the original 200 or so MG fighters who attacked the city had survived. Different respondents came to the same conclusion that the presence of FTFs in the city was limited. During the initial hours of the siege, an 80-strong band of local gunmen he heard speaking in Maranao seized Father Chito Soganub.[20] Soganub was the only Catholic priest permanently assigned in Marawi since 1995. During Soganub’s 116 days in captivity, he recalled that he saw 10–12 FTFs among the 80-strong Maute unit based inside the . He assessed that the FTFs were either Indonesians or Malaysians. In his opinion, the FTFs were “not impressive” and appeared to have “no [combat] experience.” They appeared more eager to attain martyrdom and would gleefully explain to him that they wished to die in combat to ascend to heaven. From a special operator’s perspective, the presence of foreign fighters was “negligible.”[21] As an illustrative example, one Philippine Army officer recalled how his unit was able to recover the cadaver of one “tall, fair- skinned” fighter but was unable to determine his nationality. One Indonesian straggler was captured, days after the end of major combat operations in the city. Nonetheless, remnants of the MG were able to evade capture in Marawi and sought refuge in rural municipalities of the Lanao del Sur province. Three “hard-core” MG members remained active.[22] After the Battle of Marawi,

ISSN 2334-3745 6 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 the Philippine Army’s 49th Infantry Battalion was involved in two skirmishes in neighbouring municipalities of Masiu and Tubaran, both in the Lanao del Sur province. Contrary to Marawi, Masiu and Tubaran saw no involvement of FTFs. The actual number of armed fighters accompanying the late Abu Dar varied from 10–50 individuals and varied from place to place. In areas where his clan wields more influence, Abu Dar had 50 men to protect him. In villages where his clan’s presence is weak, he mustered only 10–15 men. In spite of Abu Dar’s efforts, foreign funding remained elusive and the MG lost contact with its foreign supporters.[23] Abu Dar was subsequently killed in a military operation in March 2019.[24]

Where Is the Next Maute Group? While the MG leadership has been eliminated and its members practically dissolved, similar groups may yet emerge. Maguindanao province is estimated to have around 10 FTFs, according to community leaders.[25] Overall, there are around two dozen FTFs monitored across mainland Mindanao, with a similar number in the island provinces.[26] However, reliable evidence of the emergence of leaders like the Maute brothers, with international connections has yet to surface. Based on findings from field visits conducted for this article, the most likely enclave for MG-style groups is in the adjoining province of Maguindanao. Maguindanao’s is the location of the so-called ‘SPMS Box’. The Box has a disproportionately high number of violent incidents in the history of conflict in Mindanao.[27] In 2008, former MILF members launched attacks across the SPMS Box and the adjoining provinces of Lanao del Norte and North Cotabato to protest the collapse of peace talks between the administration of then Philippine president Gloria Macapagal-Arroyo and the MILF. It was the catalyst for of a MILF splinter group, the Bangsamoro Islamic Freedom Fighters (BIFF).

Figure 1: The SPMS Box

(Source: Conflict Alert)

ISSN 2334-3745 7 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Present in the Box is a critical mass of armed fighters that could follow the trajectory of the MG.[28] Around 100 members of a private militia, affiliated with the Ampatuan clan, are hiding in the Box.[29] These individuals are in flight from the police after the 2009 , which saw the killing of 57 journalists by the Ampatuans. These armed individuals often act as mercenaries for other political clans, especially in the run-up to a local election.[30] There are concerns that the Box can provide opportunities for local and FTF groups to converge and exchange terrorist techniques. However, similar to the Battle for Marawi, the impact of FTFs in the province appear limited at present. Improvised explosive devices (IEDs) recovered from the province remained unchanged and do not show indications of foreign influences.[31] A “handful” of FTFs are suspected to be in the SPMS box. Expectations of receiving financial resources from the , which, however, remain unfulfilled, motivated their local hosts.[32] For the time being, FTFs just provide a degree of prestige to their local hosts.

The Limited Role of Madrasahs The MG was monitored as it was attempting to “influence” madrasahs and to “take advantage” of lax education accreditation schemes.[33] Nevertheless, these overtures were not successful. Local Islamic teachers in Lanao del Sur and Maguindanao were actively contesting jihadist narratives at the village level.[34] In Maguindanao, it was noted that aside from religious instruction, indigenous forms of conciliation mechanisms have successfully mitigated conflict. The so-called ‘Iranun corridor” in Northern Maguindanao is bracketed by areas influenced by the Maute Group and the BIFF.[35] Yet, Iranun areas have remained free of jihadist-inspired violence. In the case of the MG, their recruitment process was premised mostly on financial gain. Young recruits were enticed by cash payments and access to firearms.[36] Parents of recruits were told that their children would be sent to vocational schools in the Marawi and Cotabato City. The MG leadership themselves were products of an elite Christian college in Marawi.[37] It is unclear whether either Omar or were educated in the Middle East () or South Asia ()—such claims may have been part of personal myth-making. [38] Instead of looking at religious schools, a more accurate indicator of levels of youth radicalisation could perhaps be found in observing secular schools. In Marawi, Mindanao State University (MSU) was exploited by the Maute clan as a recruiting ground for disaffected youths.[39] In Cotabato City, vocational institutions such as the Cotabato City State Polytechnic was the source of recruits that would ultimately be proficient in bomb making.[40]

The New Bangsamoro and Violent Extremism Monitoring the situation in Cotabato City goes beyond looking at its educational institutions. The effectiveness of governance in Cotabato City, the de facto capital of the new BARMM, could be a bellwether for future trends, including those related to violent extremism. On January 21, 2019, a plebiscite was held to ratify the (BOL). The referendum garnered 1.5 million ‘Yes’ votes with only 199,000 ‘No’ votes. A new Bangsamoro region replaced the now- defunct Autonomous Region in Muslim Mindanao (ARMM). The BARMM included more than 60 additional villages contiguous to the ARMM, as well as Cotabato City. The BOL was the culmination of the 2014 Comprehensive Agreement on the Bangsamoro (CAB), which signed by the government of Philippines and the MILF. Both the top leadership of the Philippine government and the MILF have heralded the event as the beginning of meaningful governance. However, the BTA has had a shaky start. For instance, the appointment process for youth representatives was “haphazard”, with some appointees stripped of their designation at the last minute.[41] Another issue raised was the domination of the BTA members from the Maguindanao ethnic group, which was only one out of

ISSN 2334-3745 8 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

13 Filipino Muslim groups.[42] High expectations over what the BARMM can deliver cannot not match the intricate details that need to be resolved in the short-term. The priority for the BTA is on “daily needs” of residents of the Bangsamoro Autonomous Region in Muslim Mindanao (BARMM).[43] However, the challenges faced by the BTA is the absence of several key policy instruments - namely the Electoral Code, the Administrative Code, and the Budget Code for the BARMM. Without these codes, the BARMM will not be able to recruit and retain members of the civil service, undertake procurement, and conduct BARMM-wide elections. Delays in infrastructure projects can be the catalyst for frustration among Cotabato City residents and the Bangsamoro as a whole.[44] A pessimistic assessment warned that if there are no meaningful projects completed in six months, residents of the BARMM may take that as a “tipping point” for the resurgence of anti- government sentiments.[45] MILF members are apparently feeling left out of high-level discussions between the Manila and Cotabato-based elites. The advocacy for the BARMM has reversed from a grassroots effort to a more top-down arrangement. From a security point of view, the multitude of security mechanisms may prove paralysing to the BARMM. The command-and-control arrangements for the Cotabato City police force are one example. Units in the city are under the control of Police Regional Office (PRO) XII, a PRO adjacent to the now-defunct PRO of the Autonomous Region of Muslim Mindanao. Police officers in Cotabato City were given the option of joining the PRO-BARMM or returning to their ‘mother unit’. Some police personnel refused to join the PRO-BARMM for fear that it would be politicised.[46] If the mood in Cotabato City is to be the gauge, the question is no longer whether there will be frustration and impatience at the grassroots level. Without tangible improvements to peace and development, the Bangsamoro constituency may be disillusioned and trigger another cycle of secessionist-inspired violence. The challenge now for the BTA is to manage frustrations in the short-term while building sustainable institutions by 2022. Mindanao is no stranger to how violent extremist groups can thrive and exploit governance vacuums. As BARMM Chief Minister Murad remarked, “…the success of our [Bangsamoro] government is the best antithesis to violent radicalism.”[47]

Proxy Indicators to Detect Future ‘Marawis’ This article highlights the need to identify alternative measures to detect more sources of violent extremism in Mindanao. The lack of good governance and the levels of clan conflict appear to be the most promising indicators for future ‘Marawis’ in central Mindanao. Recruitment remains a clan-based and community-level activity. In turn, weak governance structures can incentivise the creation of private militias as a hedge against uncertainty. At worst, what starts as self-organised groups for communal defence can trigger a security dilemma as clans become inadvertently locked in a spiral of escalation with other militias. More than two years after Marawi, the socio-economic and political context that gave rise to the Maute Group remains largely unchanged. Illicit economic activities by organised crime groups, whether committed directly or in cooperation with militias, can be considered as an indicator. Another quantifiable proxy indicator is the presence or absence of an entrenched criminal syndicate in a locality. Criminal syndicates when threatened by political and economic stressors can be compelled to embark on more violent trajectories—as seen in the evolution of the MG as an organisation. This implies closer cooperation between government agencies—going beyond combined law enforcement and military operations, to systematic inclusion of financial intelligence organisations. Instead of focusing primarily on tracking down personalities or groups espousing violent extremist ideology, it may be more prudent to include collection and production of intelligence on organised crime groups in proximity to known strongholds. Detecting any future ‘Marawis’ would also entail monitoring non-traditional measures that may not be directly related to CVE or security initiatives. Statistics on municipal or even village-level economic inequality, out-of- school youth, and even incidents of financial fraud can serve as early-warning indicators. Reliance on security

ISSN 2334-3745 9 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 sector-measures such as the number of violent incidents has limited early-warning utility. An initial test for the validity of these proposed proxy measures of violent extremism could involve comparisons between different localities in the BARMM. For instance, municipal and village-level statistics on income inequality from conflict- affected and conflict areas can be compared. A succeeding test can entail using the presence of armed conflict as a control variable to determine the effect of income inequality. The same two-step process can be repeated for other proposed proxy measures to detect future ‘Marawis’.

Conclusion What needs to be further examined if there are the ideological shifts occurring VEOs in Mindanao. Subject matter experts interviewed expressed surprise at the seemingly minimal use of MG- and IS-inspired groups of social media to recruit new members. Getting individuals to join remains a clan-based and community-level activity in Mindanao. It is also very striking that suicide attacks are not a common fixture in the repertoire of Filipino militants. Even the five-month-long siege in Marawi saw the conspicuous absence of suicide IEDs or vehicle-borne IEDs (VBIEDs). The Battle for Marawi was an existential fight to the finish for the MG and its allies. If Marawi was not enough to prompt the MG to use more lethal measures such as VBIEDs, then it is hard to think of a conflict with even higher stakes. In short, the apocalyptic ideology of IS has not been fully conveyed to Filipino militants—it was better to try to live to fight another day. Material gains through terrorist means remain the most potent driver that sustain and incentivise non-state armed groups in the Philippines. In such a scenario, ideology justifies and legitimises terrorist tactics. The oft-assumed role of ideology in motivating violence is flipped on its head. Even with the demise of IS and its allies, it is unlikely that violent extremism would disappear overnight in Mindanao or the Philippines as a whole. While not posing an existential threat, VEOs would remain a persistent challenge. Clearly, there are many potential areas of study that can be pursued to head off any future “extremisms.”

About the Author: Joseph Franco is a Research Fellow at the Centre of Excellence for National Security (CENS) of the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University. As Research Fellow with CENS, Joseph examines terrorist networks in Southeast Asia and CVE best practices. Joseph previously worked for the Chief of Staff, Armed Forces of the Philippines (AFP), and the J3, AFP. He provided consulting services for the enhancement of internal security operations; deployment of peacekeeping forces; and special operations forces. Joseph has also done consulting work in the fields of strategic communications and Asia-Pacific security.

Notes

[1] International Committee of the Red Cross, “Marawi conflict: 2 years on, over 100,000 people still have no homes to return to.” May 22, 2019. URL: https://www.icrc.org/en/document/marawi-conflict-two-years-over-100000-still-have-no-homes-return. [2] Agence France-Presse, “Shattered Philippine city a tool for jihadist recruitment.” New Straits Times, May 23, 2019. URL: https:// www.nst.com.my/world/2019/05/490691/shattered-philippine-city-tool-jihadist-recruitment. [3] Zachary Abuza [@ZachAbuza] Tweet (10 December 2018). URL: https://twitter.com/ZachAbuza/status/1072141062972559364. [4] Ben Rosario, “Retired officers call on president to stop massive vote-buying in Lanao del Sur, Marawi City.”Manila Bulletin, May 1, 2019. URL: https://news.mb.com.ph/2019/05/01/retired-officers-call-on-president-to-stop-massive-vote-buying-in-lanao-del- sur-marawi-city/. [5] John Unson, “Explosions rock Cotabato, Maguindanao on the eve before election.” Philippine Star, May 13, 2019. URL: https:// www.philstar.com/nation/2019/05/13/1917467/explosions-rock-cotabato-maguindanao-eve-election#tUQtiZ12jkyQXf2m.99. [6] Katrina Domingo, “COMELEC admits vote counting machines with ‘issues’ tripled in 2019 polls.” ABS-CBN News, May 13, 2019. URL: https://news.abs-cbn.com/news/05/13/19/comelec-admits-vote-counting-machine-issues-tripled-in-2019-polls. [7] International Alert-Philippines, Conflict Alert 2018: War and Identity (: International Alert, 2018).

ISSN 2334-3745 10 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

[8] Author interview with former Joint Task Force Marawi officer in Taguig City, Philippines, June 27, 2018. [9] Author interview with the head of a Filipino Muslim non-government organisation at Quezon City, Philippines, June 26, 2018. [10] Author interview with Task Force Bangon Marawi (TFBM) Field Office official in Iligan City, Philippines, August 28, 2018. [11] James Lewis, “The Battle of Marawi: Small Team Lessons for the Close Fight.”The Cove, November 26, 2018. URL: https:// cove.army.gov.au/article/the-battle-marawi-small-team-lessons-learned-the-close-fight; and Joseph Franco, “The Battle for Marawi: Urban Lessons for the AFP.” Security Reform Initiative Working Paper, October 2017. URL: http://www.securityreforminitiative. org/2017/10/04/battle-marawi-urban-warfare-lessons-afp/. [12] Author interview with senior counterterrorism intelligence official in Quezon City, Philippines June 26, 2018. [13] Author interview with International Decommissioning Board member in Cagayan de Oro City, August 26, 2018. [14] Joseph Franco, “Assessing the Feasibility of a ‘Wilayah Mindanao’” Perspectives on Terrorism Vol. 11, No. 4 (2017). URL: http:// www.terrorismanalysts.com/pt/index.php/pot/article/view/620/html. [15] Ibid. [16] International Crisis Group, “Philippines: Addressing Islamist Militancy after the Battle for Marawi”ICG Commentary, July 17, 2018. URL: https://www.crisisgroup.org/asia/south-east-asia/philippines/philippines-addressing-islamist-militancy-after-battle- marawi. [17] Franco, J., “Assessing the Feasibility of a ‘Wilayah Mindanao’”, op. cit. [18] Author interview with infantry operations officer in Butig municipality, Lanao del Sur, Philippines, August 29, 2018. [19] Author interview with local NGO organiser employed by international NGO in Cotabato City, Philippines, March 19, 2019; and author interview with counterterrorism intelligence officer in Cagayan de Oro City, Philippines, August 31, 2018. [20] Author interview with Chito Soganub in Cagayan de Oro City, Philippines, August 27, 2018. [21] Author interview with First Scout Ranger Regiment officer in the Islamic City of Marawi, Philippines, August 30, 2018. [22] Author interview with an infantry battalion commander in Butig municipality, Lanao del Sur, Philippines, August 29, 2018; and author interview with infantry operations officer in Butig municipality, Lanao del Sur, Philippines, August 29, 2018. [23] Author interview with counterterrorism intelligence officer in Cagayan de Oro City, Philippines, August 31, 2018. [24] Dancel, Raul. 2019. “Philippine officials say DNA tests confirm death of Abu Dar, last of key plotters of Marawi siege.”The Straits Times, April 14, 2019. https://www.straitstimes.com/asia/se-asia/dna-tests-confirm-death-of-abu-dar-last-of-key-siege-plotters-of- philippines-marawi. [25] Author interview with Maguindanao community leader in Cotabato City, Philippines, March 21, 2019. [26] Author interview with Maguindanao-based military intelligence officer, in Cotabato City, Philippines, March 22, 2019; and author interview with Maguindanao community leader in Cotabato City, Philippines, March 21, 2019. [27] Wilfredo Torres III, Rido: Clan Feuding and Conflict Management in Mindanao (Quezon City: Ateneo de Manila University Press, 2014). [28] Author interview with Maguindanao-based senior infantry division officer in Quezon City, Philippines, March 18, 2019. [29] Author interview with Maguindanao-based military intelligence officer, in Shariff Aguak municipality, Maguindanao province, Philippines, March 21, 2019. [30] Ibid. [31] Ibid. [32] Author interview with Maguindanao community leader in Cotabato City, Philippines, March 21, 2019. [33] Author interview with national security official at Malacañang Palace Complex, Manila, Philippines, June 25, 2018. [34] Author interview with a local staffer of an international NGO in Cotabato City, Philippines, March 21, 2019. [35] Author interview with an international NGO security officer in Cotabato City, Philippines, March 21, 2019. [36] Jamela Alindogan, “Philippines: ISIL-linked Maute recruiting children in Mindanao.” Al Jazeera, June 3, 2018. URL: https://

ISSN 2334-3745 11 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 www.aljazeera.com/news/2018/06/philippines-isil-linked-maute-group-recruiting-children-marawi-180603090545747.html. [37] Author interview with Chito Soganub in Cagayan de Oro City, Philippines, August 27, 2018. [38] Author interview with counterterrorism intelligence officer in Cagayan de Oro City, Philippines, August 31, 2018; and author interview with the head of a Filipino Muslim non-government organisation in Quezon City, Philippines, June 26, 2018. [39] Author interview with former Joint Task Force Marawi officer in Taguig City, Philippines, June 27, 2018. [40] Sidney Jones, “Radicalisation in the Philippines: the Cotabato Cell of the ‘East Asia Wilayah’” Terrorism and Political Violence Vol. 30, No. 6, pp. 933–943. [41] Author interview with local NGO organiser employed by international NGO in Cotabato City, Philippines, March 19, 2019. [42] Author interview with a BTA member from the academic profession in Cotabato City, Philippines, March 20, 2019. [43] Author interview with local NGO organiser employed by international NGO in Cotabato City, Philippines, March 19, 2019; and author interview with a BTA member from the legal profession in Cotabato City, Philippines, March 20, 2019. [44] Author interview with a BTA member from the academic profession in Cotabato City, Philippines, March 20, 2019. [45] Author interview with a BARMM consultant in Cotabato City, Philippines, March 20, 2019. [46] Author interview with Cotabato City journalist in Cotabato City, Philippines, March 20, 2019. [47] John Unson, “Ebrahim: Success of BARMM best antidote to extremism.” Philippine Star, March 29, 2019. URL: https://www. philstar.com/nation/2019/03/29/1905609/ebrahim-success-barmm-best-antidote-extremism.

ISSN 2334-3745 12 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

The Threat of Transnational Terrorist Groups in Kashmir by Abhinav Pandya

Abstract

The present analysis is based mainly on personal local observations in Kashmir. The situation on the ground is vulnerable and can facilitate the penetration of transnational terrorist groups (TTGs) in Kashmir as parts of society are going through intense radicalization. Militancy, in ideology and tactics, is increasingly assuming - - style features, with IED attacks and suicide bombing becoming more widespread. New terrorist organizations like ISJK (Islamic State of and Kashmir), and AGuH (Ansar Ghazwat-ul-Hind) fight for the idea of an Islamic Kashmir. The conflict is passing into a new phase of internationalization, and the penetration of TTGs is a part of that process. The recent abolition of Kashmir’s special status, addressed in a Postscript, is likely to strengthen the alienation and, hence, create enabling conditions for TTGs to establish a firm foothold in Kashmir.

Keywords: , , TTGs, Al Qaeda, IS, ISJK, radicalization, , AGuH, Political , fidayeen, alienation, Article 370

Introduction

On 9th July, AQ chief Zawahiri released a video message calling Kashmir-based jihadist groups to “single- mindedly focus on inflicting unrelenting blows on the and government so as to bleed the Indian economy and make India suffer sustained losses in manpower and equipment.”[1] In a video, exclusively focused on Kashmir, he also shunned Pakistan as no longer being a trustworthy ally for the liberation of Kashmir. He accused Pakistan of betraying the cause of and helping the ‘crusaders’. Zawahiri also said that Kashmir is a bleeding wound in our heart, “...a tragedy made even direr by the fact that they are caught between Hindu brutality on one hand and the treachery and conspiracies of Pakistan’s intelligence agencies on the other hand.”[2]

Al Qaeda first stated its ambitions of creating an Islamic emirate in South Asia by obliterating the boundaries created by the British in 2014 when AQIS—the acronym for Al Qaeda in Indian Subcontinent—began taking entire South Asia in its ambit, thereby showing AQ’s disregard for the existing boundaries of sovereign states in South Asia. Since then, AQ has been making attempts to expand in India. While these attempts have so far not resulted in substantial success, according to the author’s informed sources in India’s intelligence circles, AQ has made inroads in the Indian hinterland and even in South India.[3] Nevertheless, Ansar Ghazwat-ul- Hind (AGuH), AQ’s Kashmir affiliate, is still considered a fledgling one by prominent strategic analysts and the intelligence brass of India.

Kashmir had already figured in AQ videos on South Asia many years ago, although not very prominently. In 2006, Zawahiri had praised the jihadist organizations fighting against the Indian government in Kashmir.[4] More recently, in December 2017, an -language video clip of Nasheed (Islamic chants) titled “Kashmir Lost but not Forgotten,” was released by AQ’s as-Sahab Media Foundation.[5]

Like in the past, many of India’s top terrorism experts and security mandarins in Delhi are likely to treat Zawahiri’s most recent video message as another desperate attempt to find a foothold—high on optics and weak on real substance. The Indian intelligence brass is still dominated by the old school of thought, which tends to believe that the possibility of a ramping up of the activities of international terrorist actors in Kashmir theatre is remote. Their views are the result of previous experiences. Their generation had dealt with the Kashmir problem very tactfully so that it quite successfully escaped the spread of , AQ, and other international actors in the past, thereby largely remaining a localized conflict theatre. Besides, the situation on the ground, of the regional affiliates of AQ and IS, indicates that they are in poor shape, lacking cadres, weapons, and

ISSN 2334-3745 13 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 organizational integrity. Overall, a massive crackdown on militancy since 2016 has neutralized all the top commanders and ushered in a feeling of fatigue among them.[6] Their finances are exhausted, and there is a considerable dearth of weapons. Recruitment has also come down.[7]

However, this author believes that the recent message of AQ was unique in its timing and that it needs to be taken seriously for a variety of reasons that have developed in Kashmir, especially during the violent phase of civil unrest-cum-militancy that trailed after the Security Forces (SFs) neutralized the militant commander in 2016. These developments, discussed below, have the potential to enable a smoother ride for AQ and other Transnational Terrorist Groups (TTGs) in Kashmir. Furthermore, on August 5, 2019, the government in Delhi abolished the semi-autonomous status of the state of Jammu and Kashmir (J&K). In a parallel decision, the central government of India bifurcated the state into two Union Territories (UTs) of J&K and Ladakh, directly controlled by the central government in Delhi.[8] Delhi’s recent Kashmir move is likely to create favorable conditions for TTGs, enabling them to find a firm foothold or maybe even a leading place among Kashmir’s militants. The following analysis seeks to make clear how critical and sensitive the situation in Kashmir is. If not tackled perceptively, it may facilitate the entrenchment of AQ and other TTGs in Kashmir.

The author intends to offer a holistic understanding of the emerging trends in the Kashmir conflict. However, it is pertinent to mention that the article is mainly descriptive in nature and has no theoretical ambitions.

Kashmir Conflict: History in Brief Given the complex nature of Kashmir’s conflict, a critical analysis of the emerging threat of TTGs merits a journey back into its history.[9] The conflict began right after India achieved independence from the British in 1947. Kashmir’s king was dreaming of independence and of creating an Asian in his Himalayan kingdom.[10] However, his plans were foiled when Pakistan claimed Kashmir because of its Muslim majority and sent tribal “marauders” into Kashmir. These raiders inflicted all kinds of brutalities on the local populace and came within a few miles of the capital city of . The king, in haste and under pressure, signed an Instrument of Accession (Oct. 26, 1947) in return for India’s intervention to push back the invaders. In 1948, the UN recommended a plebiscite to decide the final status of Kashmir, after the complete demilitarization of the region, allowing India to keep a minimum level of troops since Pakistan was the aggressor. The armies never returned to barracks, and the plebiscite never happened. Since then, India and Pakistan have fought three wars over Kashmir. For the last three decades, Pakistan continues to bleed India with its proxy terrorist groups. [11] It is pertinent to mention that separatist militancy is confined to the with its ten districts. It constitutes 16% of the total area of the erstwhile state of Jammu and Kashmir and 52% of the population. [12] According to the 2011 census, the Kashmir valley had a population of 6.9 million, out of which 97% were Muslims. 14% of the 6.6 million Muslims of the valley are Shia Muslims who are mostly confined to central Kashmir’s Ladakh region and the capital city of Srinagar.[13] Until now, Shias have primarily stayed away from the Sunni-dominated separatist movement.

Ever since the violent separatist militancy began in the early 1990s, the subtext of jihad and was always there, most explicitly evident when Kashmiri Hindus were threatened and told to leave their homes in 1989–1990. Many of them were killed, and reportedly, 160,000–170,000 Kashmiri Hindus were forced to emigrate by Pakistan-backed terrorist groups.[14] However, over the last decade, Islamist ideology has figured more prominently in Kashmir’s separatist movement, eroding its quasi-secular character. In fact, it is rapidly becoming the main driving force of separatism. The narrative of Azadi“ baraye Islam” (Sharia-ruled Islamic Kashmir or Kashmir as a part of global Islamic ) is fast becoming a dominant narrative, phasing out the previous narratives of “Azadi baraye Kashmir” (Independent Kashmir) and “Azadi baraye Pakistan” (Kashmir joining Pakistan).[15]

ISSN 2334-3745 14 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Growth of Pan Islamism and Wahhabi Radicalization in the Last Decade

Over the last decade, Kashmir has gone through a wave of intense religious radicalization accompanied by fundamentalism. The local variant of Islam, mystic Sufism, better known asKashmiriyat , is essentially syncretic and liberal. Amenable to coexistence with diverse faiths, it is now facing an existential threat from the Saudi- sponsored Wahhabism, popular in the shape of the Ahl-i-Hadith sect in Kashmir. Once reviled, Wahhabism has grown exponentially since 2011. According to the latest estimates, out of six million Sunni Muslims in Kashmir valley, 1.6 million are Wahhabis.[16] Ideologically, the essence of the separatist movement has always been the narrative of Jihad against “Hindu India.” Against this background, puritanical forms of Islam, like Wahhabism, were bound to find a space, and eventually, did so. Additionally, in the last six centuries, were mostly ruled by foreigners such as the Mughals, Afghans, Sikhs, and . In the existing conflict milieu, the extremist and fundamentalist clerics blamed the pacifist local Sufi Islam for the ignominious foreign rule. Additionally, they justify the exclusivist and extremist doctrines of Takfirism to purge the local Islam of syncretic and pagan practices. As a result, in much of popular perception, the local Sufi Islam has, over the last three decades, become an apostasy inspired by Hindu practices, depriving Muslims of the martial traits needed for jihad. Hence, the young generation born after militancy emerging in the 1990s has no love left for “.” They grew up with an enhanced exposure to extremist Islamic schools.[17]

Secondly, with massive petrodollar funding, Wahhabis recruited highly qualified Imams, built lavish in style with huge and luxurious hammams. They also offer generous scholarships to young students so that they can pursue higher studies in . They talk at lengths about the jihad in , Chechnya, and Myanmar, but hardly utter a word about the local Kashmir conflict to avoid the wrath of state authorities. However, they are disseminating puritanical and fundamentalist teachings of Wahhabism, which are at odds with the local pacifist Sufi Islam. Against the overall background of militancy in which Islam has long been a mobilizing factor, such teachings are increasingly being subjected to distorted and extremist interpretations, offering a fertile ground for the spread of violent combined with an exclusivist Takfiri ideology, as practiced by transnational terrorist groups like ISIS. Wahhabi teachings are drawing a large number of followers, especially from the younger generation, which finds Sufism superstitious and holds its pacifism responsible for the suppression of Kashmir by foreign powers. Salafi missionaries have intensified the religious conversion activities.

In recent years, one can find a sea-change in attitudes, beliefs, and behavioral patterns. Until 2004–2005, it was quite difficult to find a single burqa-clad woman at Kashmir University (KU). Today the situation is the opposite, i.e., it is difficult to find a single woman not wearing a burqa or hijab. A political science professor in KU told this author that when he used the word ‘secular’ when discussing the Indian Constitution in his class on polity, the students protested that the word “secular” is haram and un-Islamic. Lately, incidents of burning Sufi shrines have occurred. Sectarian conflicts between the local Etaqadi Sunnis and Wahhabis have intensified (Interested readers can turn to this author’s book Radicalization in India: An Exploration for a detailed analysis of the subject).

Apart from this, the idea of a more political Islam has also made deep inroads in Kashmir. Jamaat-i-Islami, a pro-Pakistani extremist organization, allegedly the backbone of militancy in Kashmir, is founded on the philosophy of Maulana Maududi, an extremist Islamic cleric from Pakistan. JI, a South Asian version of the , believes in the supremacy of sharia in governing state, society, and the personal lives of people. With a vast network of district coordinators (rukoons) and with sympathizers running in millions, JI has deeply penetrated politics, administration, police, academia, as well as sociocultural and religious domains. It has a robust organizational presence in remote rural areas, controlling hearts and minds through religion, social service, money, and terrorism.

In a random visit to Srinagar’s market (the capital city), one can find an ample variety of books on political Islam in small shops as well as with roadside vendors, some of these made to look like proper academic books of political science. It speaks volumes of the popularity of Maududi’s ideology. Such Islamism is massively

ISSN 2334-3745 15 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 influencing the educated young generation. For them, Maududi’s idea of Sharia-based society has no lesser standing than political theories propounded by Montesquieu, Thomas Hobbes, or Rawls elsewhere. For these students, it is an alternate model of existence, sanctioned by the divine , governing life from one’s bedroom to the affairs of the state. Manan Wani, a Ph.D. scholar who joined the militants, invoked Islamism in his letter to the youth of Kashmir.[18] Likewise, Burhan Wani, the poster boy of new-age militancy in Kashmir, glorified the idea of the caliphate and of a sharia-ruled Kashmir. The popularity of Burhan Wani can be gauged from the fact that his death in an encounter with security forces (SFs) in 2016 led to massive civil unrest, engulfing all 10 districts of the valley. In the first week of the protests, 44 people died from police fire. The long-term fallout was the rise of homegrown militancy in South Kashmir in which SFs have so far killed 733 militants.[19]

In interviews with the author, post-graduate students of KU of different departments suggested that when democracy and governance fail, the natural alternative is a political Islam, which has “divine” solutions for running the state and society. In Kashmir, disenchantment with corrupt, arrogant, and elitist mainstream politicians and bureaucrats, bad governance, and tampering with democratic procedures, has pushed many people into the fold of Islamism. Further, students at KU informed the author that the conflict of the last three decades had pushed their society into a state of “collective depression.” With so many young lives lost and excesses committed by SFs and militants, this worldly life has, in the eyes of many of them, become meaningless. Many, if not all, of the young generation are going through deep psychological crises, given the fact that they have no opportunities to develop their talents. For them, Islam becomes the best recourse in such a situation. For those searching peace, it becomes a source of anchorage, spiritual strength, and relief through prayers, and for those seeking identity and empowerment, political Islam offers a strong platform and mobilizing narrative.[20] In such a surrounding, vulnerable young minds become an easy target for extremist clerics providing them with religious justifications for engaging in violent jihad. Since 2010, Wahhabism and Maududi’s political Islam have been on the rise, paralleled by significant changes in militancy, sociocultural attitudes and behavioral patterns, as well as the collective psychology of the people in Kashmir.

Development of the ISIS Grid

Today following of ISIS is quite entrenched in central Kashmir. This author’s investigation included interviews will 300 young boys and girls (aged 15–30) in Down Town, Srinagar, and in the districts of , Bandipura, and . 90% of the interviewees were studying in schools managed by Jamaat-i-Islami and Ahl-i- Hadith sects. In the unstructured interviews, the interviewees expressed hatred for SFs and a huge belief in the narrative of new-age militants like Burhan Wani and Zakir Musa (who had publicly vowed to establish an Islamic caliphate in Kashmir, disregarding Pakistan). Furthermore, these students also expressed great sympathy for ISIS and AQ. However, they did not approve of the brutality of ISIS towards Muslims. They preferred AQ’s model over the one of ISIS for Kashmir. Most alarmingly, almost 80% of them, including 70% of the girls, hailed Adil Dar, the suicide bomber behind the Fidayeen attack of February 14, 2019 which led to the death of 44 SFs personnel and brought India and Pakistan to the brink of war, as a hero and a martyr. All of them had Adil’s last video message in their phone in which he had urged females to “wear veils,” “not fall in love,” and urged friends and relatives to “celebrate his martyrdom for Islam.”[21]

One of the interviewees, Mushtaq Bandey (name changed), was a former militant of Lashkar-i-Taiba, a UN proscribed terrorist group responsible for the November 29 Mumbai attacks in 2008. Mushtaq is still facing a trial for murdering a policeman. However, he is a reformed man and out on bail. He informed the author that post-2016, the new generation, especially boys above 13 years of age, is immensely inspired by ISIS. Further, he suggested that the most important source of their radicalization was online propaganda material. A loosely structured grid has come up from Budgam to Bandipura where one can witness a massive following for the caliphate ideology—the vision of Kashmir’s destiny as a part of the global Islamic Caliphate. Srinagar has become a significant center of it. Every Friday, after prayers, one can witness the waving of several ISIS flags. Recently, the pulpit of Mirwaiz, the chief priest of Jamia Mosque (in ) and a prominent separatist leader, was vandalized by ISIS supporters.[22] When the author inquired about recent fencing of the

ISSN 2334-3745 16 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 mosque with barbed wire, a close associate of Mirwaiz informed the author that their worst fear these days is that a prayer congregation might get bombed by a fidayeen of the Islamic State of Jammu and Kashmir (ISJK), the self-proclaimed local affiliate of ISIS (no bay’a allegiance) or AGuH. It is pertinent to mention here that Mirwaiz is the follower of local Sufi Islam (Etqadi sect), and an ideological opponent of Wahhabi ideology.

From Srinagar, the caliphate ideology is spreading fast into the remote areas of South Kashmir. , , and the districts in South Kashmir have emerged as new strongholds of jihadi terrorist outfits like Jaish-e- (a Maulana -led Pakistan-based jihadi terrorist organization with expertise in suicide attacks and allegedly responsible for the attack on the Indian parliament in 2001 as well as the recent Pulwama suicide bombing in February 2019), ISJK, and Ansar Ghazwatul Hind. These groups have confirmed ideological links with transnational terror groups like the Taliban, IS, and Al Qaeda, respectively. The Pulwama fidayeen attack, which brought India and Pakistan on the verge of a full-fledged war was planned in the Marhama village of Anantnag.[23]

The new narrative gaining currency is not one of an independent Kashmir or Kashmir’s accession to Pakistan. The new narrative of “Azadi” or freedom is that ofAzadi baraye Islam, i.e., freedom through Islam. Zakir Musa left Hizbul Mujahiddin (HM), the old Pakistan-supported militant organization fighting for the freedom of Kashmir and its accession to Pakistan, and formed a new terrorist organization—Ansar Ghazwat-ul-Hind (AGuH), the local affiliate and the ideological front of Al Qaeda in Kashmir.[24] The AGuH formation was declared by the Global Islamic Media Front, the online propaganda distribution arm of AQ.[25] On Zakir Musa’s death (May 23, 2019), AQIS paid rich tribute to him and welcomed the declaration of the new commander of AGuH in June: Abdul Hamid Lelhari.[26]

Zakir Musa who studied at the elitist Navodaya School and graduated in engineering, categorically stated that the fight in Kashmir is for Allah and Islam. He even threatened to slit the throats of the prominent separatist leaders of the Hurriyat conference for betraying the cause of Allah.[27] Seeing his popularity among the young generation, Syed Shah Geelani, the most popular separatist leader, had to acknowledge that he was acting according to the principles of Islam. Zakir Musa’s popularity among the teenagers and young generations seemed to know no bounds. He was a celebrity militant and a youth icon. Eight-year-old boys have started participating in stone-pelting on security forces and government officials, and proudly display the symbol of Musa. The author, in his visits to primary and higher secondary schools, found that the classroom walls were marked with graffiti referring to Musa’s army. Zakir Musa marks a significant ideological shift from “azadi” to Islamism, though Islamism was there since 1990, but only as a sub-text.

Indian intelligence agencies and security forces realized that Musa could radicalize an entire generation. Neutralizing him became a top priority to save Kashmir from slipping away into the clutches of jihadi forces. However, there were fears of a mass uprising. The fear-stricken state authorities remained extraordinarily vigilant, and nothing severe happened. After his death, Musa’s telephonic conversation with a militant Abu Dujana, reflecting his firm belief in Islamic rule, was released by AQ. It put to rest the rumor spread by Pak- supported militant groups like HM that Musa was a brain-child of Indian intelligence.[28]

After his death, Musa is inspiring more young minds to fight for the cause of Allah. Many militants have left HM and joined AGuH. HM commander Riaz Naikoo had to release an audio message that initially accused ISJK and AGuH of having intentions to turn Kashmir into a ‘Syria-Iraq.’ However, later he appealed them to stop the infighting with Pakistan-supported terrorist groups like HM and LeT (Lashkar-e-Taiba). The audio message shows the desperation of HM over the rising popularity of TTGs like ISJK and AGuH.[29] However, the dominant trend now is to join radical Islamist terrorist groups like Jaish-e-Muhammad, ISJK, and AGuH. According to informed sources, there are hundreds of young men willing to join AGuH, but they do not have weapons. Besides, there are thousands of highly radicalized stone-pelters and OGWs who are willing to join outfits like AGuH, Jaish, and ISJK, the moment they get hold of weapons. While it is generally acknowledged that currently, outfits like AGuH and ISJK do not have a very robust structural integrity, an organized cadre, strong leadership, or financial resources and weapons, the sentiment has taken deep roots. In a milieu like

ISSN 2334-3745 17 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 the existing one, TTGs like AQ and IS can fill that leadership vacuum. It can help their local fronts acquire structural integrity and train them in motivating and recruiting impressionable minds.

Disenchantment with Mainstream Politics and Pakistan

Furthermore, in today’s Kashmir, there is enormous disenchantment with mainstream politicians and with the democratic system which elected them. This also goes for separatist leaders due to their corruption and due to Pakistan’s alleged duplicity. That said, there is a strong likelihood of common folks sympathizing with those who are fighting for the cause of religion rather than, as in the past, for political goals. With such a sentiment dominating hearts and minds, transnational terrorist groups like AQ and ISIS can easily project themselves as dependable warriors of Allah indulging in jihad. Other factors that might induce the Sunni-extremist Wahhabi groups to intensify their activities in the state include Iranian inroads and Shia radicalization, rapidly pacing towards dangerous levels in Kashmir.[30]

Emerging Craze for Suicide Bombing and IEDs

The militancy, in tactics, is also taking on Middle Eastern features. Due to India’s strengthening of its counter- infiltration grid, it has become immensely difficult to smuggle weapons from Pakistan-occupied Kashmir. Pakistan is also under the pressure of international financial action task force (FATF) sanctions while also facing a significant economic crisis. Whether FATF’s grey listing of Pakistan has brought any tangible reduction in financially and logistically supporting proxy terrorist groups (HM, LeT and JeM) operating in India, needs more rigorous evidence-based analysis. However, a brief look already points to the complexity of the terrorist- financing system which Pakistan’s deep state built over the years in Kashmir (see endnote).[31]

That said, Pakistan is not able to allocate enough financial resources to fuel Kashmir’s proxy war. In addition, its government cannot afford losing legitimacy any further by facilitating the smuggling of weapons. Hence, the dearth of weapons has compelled militant organizations to explore fidayeen attacks and use Syria-Iraq styled IEDs and VBIEDs (Vehicle-borne IEDs). In 2018, there were eight IED attempts in Kashmir, but many of them failed to explode.[32] In 2019, the IED system improved in terms of better quality of the explosives and better training of their handlers. In the last months of 2019, 60 foreign terrorists infiltrated from Pakistan.[33] Reportedly, they are training local militants in Kashmir in making IEDs and how best to place them. In the first half of 2019, three successful IED blasts had taken place.[34] After the Pulwama incident, a car-born fidayeen attack was averted on the pass.[35]

Such attacks have high news value as they brutally strike terror of a much higher magnitude with maximum casualties and with an element of surprise, multiplying people’s fears and insecurities. They also have a debilitating effect on the morale of SFs. One can witness an emerging trend of increased fidayeen attacks in Kashmir—a phenomenon until now confined to FTs (foreign terrorists) only. However, it has to be recalled that Jaish and Lashkar have carried out suicide missions in the past as well. As early as 2001, Jaish carried a suicide bombing mission ramming an explosives-laden car into Kashmir’s state assembly. After that, Kashmir-centric terrorist groups like Jaish and Lashkar executed suicide missions in their attacks on the Indian parliament in 2001 (Jaish) and in Mumbai in 2008, respectively. However, in most of these attacks, local Kashmiri boys were rarely involved. The groups mentioned above are foreign terrorist groups, presumably controlled by Pakistan- based ISI handlers. The involvement of a local Kashmiri in the 2001 assembly attack was an exception.

However, unlike in the pre-Burhan Wani (that is before 2016) militancy, the post-Burhan Wani suicide missions are linked to the spread of a belief in Islamic Kashmir and a more robust influence of global Islamist movements. Post-Burhan suicide missions have drawn local Kashmiri boys in the dragnet. Already before Pulwama, in January 2018, there was a in Tral, involving a local Kashmiri youngster.

ISSN 2334-3745 18 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

After the Pulwama attack, the fidayeen Adil Dar got overnight fame by bringing two countries in possession of nuclear weapons on the brink of war. The fact that Adil Dar, a native Kashmiri, volunteered for a suicide bombing speaks volumes about the psychological, attitudinal, and behavioral changes occurring in Kashmir’s society. One can witness a newfound inclination among some youth for making IEDs and VBIEDs. One of the most important reasons for joining militancy in south Kashmir is the desire for recognition, social status, and glory among the jobless youth, which has otherwise nothing to look forward to, except doing drugs. Joining militancy and posting pictures on Facebook in war-like gear gives some of them instant fame and, in their imagination, an entry ticket to the Islamic paradise. Ever since Adil Dar got overnight fame, one can witness a craze among young militants to volunteer for body-strapped suicide bombings and vehicle-based improvised explosive devices (VBIEDs).

Given that Kashmir’s Muslim community is traditionally considered as being much more liberal in comparison to Muslims from other parts of the Indian subcontinent, local youth’s inclination towards suicide attacks is extremely disturbing. Some astute observers of social trends have told this author that in the future, even girls may be willing to volunteer for such acts. If this is indeed true, TTGs like ISIS and AQ will not face problems in recruiting young people.

TTGs in Kashmir: Impact of the US Withdrawal and Internal Dynamics in Kashmir

The emerging geopolitical scenario also bodes well for TTGs. The late IS chief Baghdadi announced in 2019 Kashmir as IS’ new Wilayat, i.e., the province.[36] While Baghdadi is dead now the future trajectory of IS is a matter of strategic forecasting at best and speculation at worst. However, the ideology which ISIS represents has found a foothold in Kashmir, and in the future, it is likely to gain strength. Even if ISIS should decline, any group representing Pan-Islamism will be able to poach upon local ISIS sympathizers. If not IS, then Al Qaeda is likely to make further inroads in Kashmir. In his interviews, this author noted among local youth a preference for AQ over IS.

Having suffered territorial reverses in the Middle East, IS is likely to beef up its activities in places like Kashmir, , and the Philippines to project its relevance and existence. Sri Lankan agencies’ investigations revealed that some of the IS fidayeens who had executed Easter Sunday bombings had travelled to Kashmir for training in explosives.[37] Besides, ISKP (Islamic State in Khorasan Province) has shown a substantial presence in Nangarhar (Afghanistan). A number of Indians from Kerala have already joined them in Afghanistan. It is highly likely that Kashmiri boys are also caught in the IS dragnet. With the US’ withdrawal from Afghanistan on the cards now, both AQ and ISKP are likely to find safe havens in Afghanistan, at least in areas under the control of the Taliban. Mr. CD Sahay, former chief of the Research and Analysis Wing (RAW), India’s external intelligence service, suggested to the author in a telephonic interview that if TTGs wish to find a strong foothold in Kashmir, then they have to keep Pakistan’s deep state in good books. Furthermore, Pakistan’s decades of experience and ground network in Kashmir may be immensely helpful to TTGs in terms of logistics, shelter, and other operational requirements. He further opined that, given the fact that Pakistan has sheltered AQ operatives in the past, it is highly likely that Pakistan may support the entrenchment of TTGs in Kashmir. Such an arrangement suits Pakistan also, as it offers its military a semblance of plausible deniability in the event of any major terrorist incident happening in India. According to the high-value sources consulted by the author, Pakistan is already shifting terrorist training camps from PoK (Pak Occupied Kashmir) to Afghanistan.

Transnational terrorist groups like AQ and IS have internal disputes, and many times they are seen at the crossroads. In Kashmir, as mentioned above, AGuH was bitterly opposed by Pak-proxy groups like HM— so much so that they tried to brand Zakir Musa as an Indian asset. That said, one question that puzzles the strategic minds is what if AQ and IS clash with each in Kashmir, through their proxies. However, the author, while researching for this article, found that the majority of the militant groups are on the verge of arriving at a consensus that they must have a tactical compromise keeping aside the ideological differences because they have a common enemy viz. India. Zakir Musa and Riaz Naikoo had earlier appealed to militants to put up a

ISSN 2334-3745 19 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 united front. In Zawahiri’s most recent video message, he can be seen urging the mujahids to wage a “united jihad” against India.

Furthermore, it also merits attention that there is a strong likelihood of TTGs using Kashmir as a base to expand their activities into other parts of India. As it is already known, IS-mindset has deeply penetrated part of the society in Kerala, parts of Telangana (mainly Hyderabad), and Maharashtra.[38] We should remember that Kerala contributed to the highest number of IS fighters from India.[39] Besides, in the North Indian heartland, Muslims are getting radicalized—the dominant narrative of Hindu-nationalism is instilling existential fears in their minds. Recent incidents of mob-lynching by Hindu extremists, the Supreme Court’s decision in favour of Hindus in the Babri-mosque dispute, and the new citizenship amendment act, which is seen as anti-Muslim, have strengthened their insecurities. A cache of weapons was recovered from a madrasa in district Bijnor in Uttar Pradesh, the heartland of India.[40] The National Investigation Agency (NIA), India’s premier counter- terrorist agency, found a Kashmir link to an ISIS cell in the Amroha district of UP.[41] In Delhi, NIA discovered a new ISIS-linked group “Harkat-ul-Harb-e-Islam.” [42] NIA also arrested 14 men in Tamil Nadu as they were trying to set up an ISIS cell.[43] That said, such a radicalized youth may be an easy target for AQ and IS. For them, Kashmir might be a new battleground to lay down their lives for a religious cause. If radicalized young Indian men and women can join ISKP in Afghanistan, they are even more likely to come in droves to join a jihad in Kashmir.

Alienation and Depression in Society

Turning to a widespread feeling in society: many people in Kashmir appear to be going through acute depression and alienation and are in a state of mourning. Many local residents feel that Delhi is following a kinetic approach (963 militants neutralized, the majority of which being local militants).[44] Ordinary citizens feel that Delhi is very high-handed and shortsighted in ignoring the impact of extrajudicial killings and civilian deaths in encounters, as well as other human rights violations by security forces—although many of the claims are exaggerated. Adding to the discomforts of routine life are highway closures for civilian traffic and rigorous frisking of people, which includes seizing their mobile phones to make sure that individuals do not store a picture of militant heroes. The general level of alienation can be witnessed by the fact that when Cordon and Search Operations (CASOs) take place to apprehend militants, thousands of people assemble to pelt stones at security forces and seek to rescue stranded militants. In the most recent example in Kulgaam in South Kashmir, one civilian was killed, and 70 were injured in police actions in May 2019 when a crowd was disrupting a security operation undertaken.[45] Unofficial sources of the author informed him that not 70 but 260 civilians were injured in this particular clash. Nevertheless, the crowd was successful in rescuing a Jaish militant from being arrested. Another sign of the times is that voter turnout in the most recent parliamentary elections has been very low, namely, less than 14% in Srinagar. The Anantnag constituency of the militancy- hit South Kashmir registered the lowest voter turnout with just 2.81%.[46] Signs of depression can be noticed everywhere. Mothers happily participate in the funeral processions of their militant-sons, hailing them as martyrs. People assemble by the thousands for funerals, and the dead militants draw such a vast fan-following that people kiss their blood-soaked feet during funeral processions. Behind such celebrations of death lie deep- rooted depression and trauma that the conflict of the last three decades has generated. Young boys joining the militancy are well aware that they will most likely be killed within months, if not days. In spite of that, they join in the hope of finding an identity, recognition, and anchorage. Such a mindset of seeking glory in death is fertile ground for recruitment for TTGs.

Cases of depression and mental illness are reaching major proportions in Kashmir. Drug abuse is one consequence. According to a survey sponsored by the United Nations’ Drug Control Program, there are 70,000 drug addicts in the , including 4,000 women.[47] A recent survey concluded that 65% to 70% of the students are drug users, including 26% of female students, with a significant number doing hard drugs such as heroin which are carrying greater health hazards.[48] Government psychiatric hospital statistics show that 90% of the users belong to the age group of 17–35.[49] A society in depression and people who feel ISSN 2334-3745 20 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 alienated are more likely to lean towards religious fundamentalism. In a conflict zone like Kashmir, the lines between religious fundamentalism, extremism, and jihadi terrorism are blurred. Further, drug-addicted weak and vulnerable minds with no sense of purpose and a big burden of guilt are easy prey for the recruiters of TTGs, as has also been witnessed in Europe where young Muslims—many of whom having drug problems and/or being petty criminals—were radicalized in prisons and gained a new sense of purpose and seemingly got rid of their baggage of guilt when becoming foreign fighters.[50] [51]

Conclusion

Finally, if the increasing penetration of transnational terrorist groups is not looked at in isolation, it will appear that it is the part of the process of internationalization of Kashmir, a process that is unfolding in various stages. This phenomenon is not entirely new. It began in 2008–2009 when Kashmir saw a Palestinian-intifada styled civil unrest with stone pelting. The Arab Spring of 2011 had also affected the hearts and minds of Kashmir’s people. In 2011, after the death of Tufail Mattoo, a civilian, during a police teargas shelling, the protestors were even planning to stage a Tahrir-square-like event in Lal Chowk of Srinagar. The Arab Spring brought two parallel streams of thought into Kashmir. In the first stream, the minuscule minority of secular-cum-left- leaning youth started seeing Kashmir as a major humanitarian crisis. They started seeing Kashmir through a global prism, equating it with Palestine, Myanmar, or Xinjiang. The second stream of thought was one of the global jihad and pan-Islamism. It has had a robust influence on separatists, in addition to the religious-minded people and the religious extremists.

Furthermore, in addition to non-state actors like IS and AQ, many state actors have become active in Kashmir, including Iran, Saudi Arabia, China, and . Though Turkey has always sided with Pakistan on the Kashmir issue, its contemporary activism is driven by its larger geopolitical ambitions in South Asia.[52] President Erdogan’s dubious links with TTGs have come to light time and again. Reportedly, Turkey has supported terrorist groups in and Syria with weapons and logistics.[53] In the future, the possibility of Turkey and Pakistan joining efforts to support TTGs in Kashmir cannot be ruled out.

That said, the conflict is transitioning into its next phase. The passage is holistic, i.e., the changes are visible on multiple fronts in terms of militant tactics, changing sociocultural attitudes, and new ideologies, with Pan- Islamism becoming dominant. Having said that, the changes are subtle; only perceptive and intuitive strategic minds can sense them and foresee probable developments, including that in the next phase of the conflict TTGs are likely to play an important role in Kashmir.

Short Postscript on the Impact of the Abolition of Article 370 [54]

Last but not least, the impact of the abolition of Kashmir’s semi-autonomous status on the subject of this article merits a brief discussion. The government in Delhi has purportedly taken such a historic step to change the separatist narrative to an economic-development narrative while creating a new political leadership through local self-governing bodies. India’s central government hopes to attract investment, create jobs, and make militancy irrelevant by fully integrating Kashmir into India. However, in local popular perception, Article 370 was a symbol of Kashmir’s unique cultural and religious identity. Its abrogation has generated many fears. Local Muslims fear that the Modi government will bring outsiders into Kashmir who might occupy their lands, change the demography, and exploit the natural resources of the state. Most such fears appear to be based on ignorance or are the result of malicious propaganda emanating from Pakistan’s deep state, local politicians, or from Islamist organizations. Over the last 30 years, religious radicalization has turned out to be the biggest threat to “Kashmiriryat.” However, a detailed exploration of the merits and demerits of article 370 would go beyond the space allocated to this article.

ISSN 2334-3745 21 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

In general, the abrogation of article 370 has not gone down well with most local people. It is likely to strengthen the trust deficit and increase alienation. Earlier, in this article, the author has alluded to the alarming levels of alienation and trust deficit in the last three years due to Delhi’s heavy-handed approach in dealing with militancy, human rights violations by its security forces, corruption in the state government, lack of outreach, poor governance, and the entirely bureaucratic nature of governance. While after the decision to abrogate article 370, there has not been massive civil unrest or a significant terrorist strike, this may be the result of the massive security clampdown and a communications lockdown. However, resentment is simmering, and in the future, it may lead to significant civil unrest and a sharp rise in militancy.

Furthermore, with Delhi’s Kashmir move, the mainstream political process in Kashmir has more or less come to a halt. Jammu and Kashmir will be directly controlled by the central government, leaving little scope for local politicians. Many of the local politicians facing corruption charges stand discredited and were not well accepted by most of the people. They were the biggest beneficiaries and votaries of article 370, which is dead now.[55] Also, the pro-Pakistan separatist leaders also stand exposed as corrupt (facing inquiries in terrorist financing), and some opportunistic politicians who accepted bribes from the intelligence agencies of India and Pakistan also stand exposed. On the other hand, India does not appear to have a long-term vision for post-article 370 Kashmir. So far, one hardly comes across any genuine outreach and sincere efforts to improve governance. The present attitude of Delhi signals that in the future, its approach towards Kashmir will be bureaucratic and military based.

Pakistan has also failed to do anything significant to compel India to backtrack from the abrogation move and, hence is fast losing credibility. Against this background, transnational terrorist groups are offered bright prospects to flourish in the vacuum created by the separatist movement on the one hand and mainstream Indian politics on the other hand.

About the Author: Abhinav Pandya is a graduate in Public Affairs from Cornell University. He has more than seven years of experience in public policy, counterterrorism, electoral politics, and the development sector in India and the US. He is the author of “Radicalization in India: An Exploration” (Pentagon Press, 2019). He regularly writes for Indian and international publications on strategic affairs. He has extensively travelled in Kashmir over the last two years for his research. During his research stay in Kashmir, he advised the former Governor of Jammu and Kashmir, Mr. Satya Pal Malik, on militancy, Pakistan’s intelligence operations, radicalization, and youth engagement in Kashmir. Currently, he is writing a book on the financing of terrorism in Kashmir.

N.B.: The author could not reveal the names of some of his sources because of the security threat to their lives. Most developments discussed in this article are very recent, which explains the lack of much academic research on the subject. Also, the security situation in Kashmir is very challenging, and hence, a researcher faces many limitations and restrictions. The author has lived in Jammu and Kashmir for the last two years. A large part of the research for this article was primarily done for the author’s recently published book, “Radicalization in India: An Exploration.” During his research work, the author has interacted with a diverse range of interlocutors, including security officials, intelligence officers, militants, ex-militants, OGWs (Over Ground Workers) of militants, religious clerics, members of JI, separatist leaders, mainstream politicians, students of the colleges and universities, ordinary citizens, government servants, as well as some deeply placed informers. In addition, the author has used reputed journalistic sources, as reflected in the endnotes.

ISSN 2334-3745 22 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Notes

[1] The al-Qaeda video is presently available on YouTube, See, “Don’t Forget Kashmir,” Al Qaeda chief threatens Indian Army, J&K govt in new video,” IB Times India, July 10, 2019; URL: https://www.youtube.com/watch?v=6_lRdrj62Tc.

[2] Roul, Animesh, “Al Qaeda’s Ayman-al-Zawahiri invokes Kashmir again, calls for ‘one jihad,” Vol.17, Issue:15, Terrorism Monitor, Jamestown Foundation, July 26, 2019, Nov. 25, 2019; URL: https://jamestown.org/program/al-qaedas-ayman-al-zawahiri-invokes- kashmir-again-calls-for-one-jihad/.

[3] Pandya, Abhinav, “Radicalization in India: An Exploration,” Chap. 3, Pentagon Press, 2019, ISBN-978-81-941634-6-6; Nov. 25, 2019.

[4] Roul, Animesh, op. cit.

[5] “AQIS Video in Urdu- Chant Promoting Cause of Kashmiris, Inciting against India,” SITE Intelligence, January 2, 2018; URL: http://sitemultimedia.org/video/SITE_AQIS_Kashmir_Lost_Not_Forgotten.mp4.

[6] Sahay & Pandya, “Kashmir: A New Chapter begins,” VIF, August 2019, accessed: Nov. 25, 2019; URL: https://www.vifindia.org/ sites/default/files/kashmir-a-new-chapter-begins.pdf.

[7] Ibid.

[8] Ibid.

[9] Fair, C. Christine, “India’s move in Kashmir: Unpacking the Domestic and International Motivations and Implications,” Lawfare, Aug. 12, 2019, accessed: Nov. 25, 2019; URL: https://www.lawfareblog.com/indias-move-kashmir-unpacking-domestic-and- international-motivations-and-implications.

[10] Desai, Dr. Hari, “ and his Kashmir Dilemma,” Asian Voice, Sept. 29, 2016, accessed: Nov. 25, 2019; URL: https://www.asian-voice.com/News/India/Maharaja-Hari-Singh-and-Kashmir-Dilemma.

[11] Fair, C. Christine, op. cit.

[12] Bamzai, Sandeep, “Kashmir: No Algorithm for Azadi,” ORF, Aug. 6, 2016, accessed: Nov. 25, 2019; URL: https://www.orfonline. org/expert-speak/kashmir-no-algorithm-for-azadi/.

[13] Jammu and Kashmir Official State Portal, accessed: Nov. 25, 2019; URL:https://jk.gov.in/jammukashmir/?q=demographics .

[14] Ibid.

[15] Pandya, Abhinav, “Militancy in Kashmir: A Study,” VIF, March 2019, accessed: Nov. 25, 2019; URL: https://www.vifindia.org/ sites/default/files/Militancy-in-Kashmir.pdf.

[16] Ibid.

[17] Pandya, Abhinav, “Radicalization in India: An Exploration,” Chap. 4, Pentagon Press, 2019, ISBN-978-81-941634-6-6, accessed: Nov. 25, 2019.

[18] Wani, Mannan, “Letter by scholar Mannan Wani on why he chose to pick up gun,” Pakistan Defense, July 16, 2018, accessed: July 22, 2019; URL: https://defence.pk/pdf/threads/letter-by-scholar-mannan-wani-on-why-he-chose-to-pick-up-gun.568030/.

[19] Sandhu, K. Kamaljeet, “113 terrorists killed in J&K this year, terror incidents tripled since 2014,” India Today, June 25, 2019, accessed: Nov. 25, 2019; URL: https://www.indiatoday.in/india/story/jammu-kashmir-terrorists-killed-1555666-2019-06-25.

[20] As told by Ph.D. scholars of KU - Ahmad Tausif, Irshad Bhatt, Sultan Zahid, and others in Srinagar KU campus on Mar. 28, 2019.

[21] “Profile of Pulwama suicide bomber: Don’t fall in love,”Economic Times, Feb. 16, 2019, accessed: Nov. 25, 2019; URL: https://economictimes.indiatimes.com/news/politics-and-nation/profile-of-pulwama-suicide-bomber-dont-fall-in-love/ articleshow/68006566.cms.

[22] PTI, “Masked men storm into Jamia masjid, wave ISIS flags,” News 18, September 30, 2018, accessed: July 22, 2019; URL: https:// www.news18.com/news/india/masked-men-storm-into-jamia-masjid-in-srinagar-wave-isis-flags-1986795.html.

[23] Assad, Bashir, “New Breed of Kashmiri Terrorists.” Vivekananda International Foundation, July 12, 2019, accessed: July 22, 2019; URL: https://www.vifindia.org/2019/july/12/new-breed-of-kashmiri-terrorists.

ISSN 2334-3745 23 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

[24] Mir, Asfandyar, “Al Qaeda’s continuing challenge to the ,” Lawfare, Sept. 8, 2019, accessed: Nov. 25, 2019; URL: https://www.lawfareblog.com/al-qaedas-continuing-challenge-united-states. [25] Tripathi, Abhinav, “It’s official: Al Qaeda announces Kashmir Unit, Zakir Musa is the leader,”Economic Times, July 14, 2018, accessed: July 22, 2019; URL: https://economictimes.indiatimes.com/news/defence/its-official-al-qaeda-announces-kashmir-unit- zakir-musa-is-the-leader/articleshow/59790965.cms.

[26] Roul, Animesh, op. cit.

[27] Sharma & Sahay, “Al Qaeda affiliate AGuH leader Zakir Musa killed in J&K - What lies ahead?,” Vivekananda International Foundation, June 17, 2019, accessed: July 22, 2019; URL: https://www.vifindia.org/article/2019/june/17/al-qaida-affiliate-aguh- leader-zakir-musa-killed-in-j-and-k-what-lies-ahead.

[28] Singh, Tikoo, Arti, “Pro-Pak and pro-Caliphate groups fight for Kashmir’s Jihadi space,”Times of India, July 17, 2019, accessed: July 22, 2019; URL: https://timesofindia.indiatimes.com/india/pro-pak-and-pro-caliphate-groups-fight-for--jihadi-space/ articleshow/70253176.cms.

[29] Hizbul Mujahiddin commander Riaz Naikoo in a fresh audio calls the militants of ISJK and AGuH for reconciliation, July 13, 2019, accessed: Nov. 25, 2019; URL: https://www.youtube.com/watch?v=zywlIkVKLPA .

[30] Pandya, Abhinav, “Iran and Saudi Arabia’s proxy wars have a new battlefield-Indian Controlled Kashmir,” , July 23, 2018, accessed: July 25, 2019; URL: https://www.haaretz.com/middle-east-news/.premium-iran-and-saudi-arabia-s-proxy-wars-have-a- new-battlefield-indian-controlled-kashmir-1.7537867.

[31] In Aug. 2019, FATF’s subsidiary, 22nd Asia-pacific Group (APG) on Money Laundering Black Listed Pakistan. Notably, APG found Pakistan did not apply 32 out of 40 ‘special’ standards and benchmark of the legal and financial system and 10 out of 11 parameters relating to compliance of safeguards against terror financing and money laundering. FATF and APG act separately; however, the deliberations and actions of both have a bearing on each other (Manoj Joshi, “Pakistan may not be able to exit FATF grey list”, post APG action, ORF). That said, Pakistan will find it immensely challenging to get out of the grey list in the Feb. 2020 meeting of FATF. Recently, ahead of October’s plenary session of FATF, Pakistan arrested Saed, the mastermind of Mumbai attacks, his four aides of Jamaat-ud-Dawa (charity wing of LeT) and also seized their property. However, Hafiz Saed was released on bail soon after that. (“Ahead of FATF meeting, Pakistan arrests four aides,”Economic Times). Mostly, Pakistan’s actions on the terror financing front have, in of this author, been an eyewash. Even the 2014 National Action Plan against terrorism largely remains unimplemented. The terrorist groups mentioned above are believed to be among the most critical assets of Pakistan in Kashmir. As a result, an honest will to act against them has been lacking. Over the last three decades, Pakistan has created a multi-layered and multi-channel terrorist financing network. It includes generating money through donations, Haj tours and travels, hawala networks, legitimate cross-border trade channels, and schools and businesses run by Jamaat-i-Islami. Hence, it is very difficult to measure the impact of the FATF actions on Pakistan’s financial support to terrorist groups. However, this subject is not the main focus of this article. The author is currently writing a book on terrorist financing in Jammu and Kashmir, which will deal with these issues in detail.

[32] Pubby, , “IEDs now a new headache for security forces in J&K,” Economic Times, June 21, 2019; URL: accessed: Nov. 25, 2019; URL: https://economictimes.indiatimes.com/news/defence/ieds-now-a-new-headache-for-security-forces-in-jk/ articleshow/69884086.cms.

[33] Pandya, Abhinav, “Post Article 370, Pakistan facing policy crises on Kashmir, creating unrest in the valley to internationalize issue, Islamabad’s last arrow,” First Post, Nov. 21, 2019, accessed: Nov. 25, 2019; URL: https://www.firstpost.com/india/post-article- 370-pakistan-facing-policy-crises-on-kashmir-creating-unrest-in-valley-to-internationalise-issue-islamabads-last-arrow-7661351. html.

[34] Pubby, Manu, op. cit.

[35] ANI, “Banihal attack on CRPF convoy was a Fidayeen attack by Hizbul-Mujahiddin terrorist,” Business Standard, Apr. 1, 2019, accessed: Nov. 25, 2019; URL: https://www.business-standard.com/article/news-ani/banihal-attack-on-crpf-convey-was-a-fidayeen- attack-by-hizb-ul--terrorist-119040101389_1.html.

[36] PTI, “ISIS announces ‘new branch’ in India after clashes in Kashmir,” Economic Times, May 12, 2019, accessed: July 23, 2019; URL: https://economictimes.indiatimes.com/news/defence/isis-announces-new-branch-in-india-after-clashes-in-kashmir/ articleshow/69288536.cms?from=mdr. [37] Pandya, Abhinav, “Jihadi terror enters Sri Lanka,” Vivekananda International Foundation, April 25, 2019, accessed: July 24, 2019; URL: https://www.vifindia.org/article/2019/april/25/jihadi-terror-enters-sri-lanka.

[38] Taneja, Kabir, “ISIS Phenomenon: South Asia and Beyond,” Observer Research Foundation, July 9, 2018, accessed: July 23, 2019;

ISSN 2334-3745 24 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

URL: https://www.orfonline.org/research/43171-the-isis-phenomenon-south-asia-and-beyond/.

[39] Ibid.

[40] Indo-Asian News Service, “Uttar Pradesh: Arms found in Madrassa during raid, sex arrested,” India Today, July 11, 2019, accessed: July 23, 2019; URL: https://www.indiatoday.in/india/story/uttar-pradesh-arms-found-in-madrassa-during-raid-6- arrested-1566498-2019-07-11.

[41] ORF, “Tracking ISIS influence in India”; URL:http://trackingisis.orfonline.org/news-archive/ .

[42] Ibid.

[43] Money control News, “Plan to set-up ISIS terror cell in Tamil Nadu, 14 arrested by NIA,” July 17, 2019, accessed: July 23, 2019; URL: https://www.moneycontrol.com/news/trends/plan-to-set-up-isis-terror-cell-in-tamil-nadu-14-arrested-by-nia-4215781.html.

[44] Times Now News, “963 terrorists killed, 413 security forces personnel lost lives in Kashmir since 2014: Government,” July 16, 2019, accessed: July 23, 2019; URL: https://www.timesnownews.com/india/article/963-terrorists-killed-413-security-forces-personnel- lost-lives-in-kashmir-since-2014-government/454801.

[45] Observer News Service, “ 1 killed, 70 civilians injured during clashes in South Kashmir,” Kashmir Observer, May 29, 2019, accessed: July 23, 2019; URL: https://kashmirobserver.net/2019/local-news/1-killed-70-civilians-injured-during-clashes-south- kashmir-43533.

[46] Rashid, Hakim, “Dismal voter turnout continues in Kashmir, with 2.81% in Anantnag; 63% in Ladakh,” The Economic Times, May 7, 2019, accessed: July 23, 2019; URL: https://economictimes.indiatimes.com/news/elections/lok-sabha/india/dismal-voter- turnout-continues-in-kashmir-with-2-81-in-anantnag-63-in-ladakh/articleshow/69209921.cms.

[47] Cit. Naqshbandi, M. Mudasir, “Drug Addiction and Youth of Kashmir,” International NGO Journal, Vol. 7 (5), Dec. 2012, accessed: Nov. 25, 2019; URL: http://www.academicjournals.org/INGOJ.

[48] Ibid.

[49] Ibid.

[50] Triyandafillidou, Anna, “European Muslims: Caught between Local Integration Challenges and Global Terrorism Discourses,” New Med Research Network, IAI Working Papers, May 2015, accessed: Nov. 25, 2019; URL: https://www.osce.org/networks/ newmedtrackII/166511?download=true.

[51] Roy, Olivier, “Who are the new jihadis?” , Apr. 13, 2017. Accessed: Nov. 25, 2019; URL: https://www.theguardian. com/news/2017/apr/13/who-are-the-new-jihadis.

[52] Pandya, Abhinav, “Recep Tayyip Erdogan’s Recent Activism on Kashmir is motivated by Turkey’s President’s Caliphate Dreams,” First Post, Nov. 25, 2019. Accessed: Nov. 25, 2019; URL: https://www.firstpost.com/world/recep-tayyip-erdogans-recent-activism- on-kashmir-is-motivated-by-turkey-presidents-caliphate-dreams-7695671.html.

[53] Rubin, Michael, “Did Turkey help ?” AEIdeas, May 13, 2014. Accessed: Nov. 25, 2019; URL: https://www.aei.org/ foreign-and-defense-policy/middle-east/did-turkey-arm-boko-haram/.

[54] The author spent three months after the abrogation of Kashmir’s special status, in Kashmir, traveling in all the 10 districts of the valley for a research project on terror financing in Kashmir. He interacted with different sections of society, administration, and politics after the abrogation of article 370.

[55] Pandya, Abhinav, “Post Article 370, Pakistan facing policy crises on Kashmir, creating unrest in the valley to internationalize issue, Islamabad’s last arrow,” First Post, Nov. 21, 2019, accessed: Nov. 25, 2019; URL: https://www.firstpost.com/india/post-article- 370-pakistan-facing-policy-crises-on-kashmir-creating-unrest-in-valley-to-internationalise-issue-islamabads-last-arrow-7661351. html.

ISSN 2334-3745 25 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Research Notes Learning in a Double Loop: The Strategic Transformation of Al-Qaeda by Michael Fürstenberg and Carolin Görzig

Abstract Like any type of organization, terrorist groups learn from their own experiences as well as those of others. These processes of organizational learning have, however, been poorly understood so far, especially regarding deep strategic changes. In this Research Note, we apply a concept developed to understand learning of business organizations to recent transformations of jihadist groups. The question we want to shed light on using this approach is whether, and in which ways, terrorist groups are able to question not only their immediate modus operandi, but also the fundamental assumptions their struggle is built on. More specifically, we focus the inquiry on the development of the Al-Qaeda network. Despite its acknowledged penchant for learning, the ability of the jihadists to transform on a deeper level has often been denied. We seek to reassess these claims from the perspective of a double-loop learning approach by tracing the strategic evolution of Al-Qaeda and its eventual breakaway faction, Hay’at Tahrir al-Sham (HTS). Keywords: Organizational learning, terrorist transformation, strategic change, jihadism, Al-Qaeda, Hayat Tahrir al-Sham

Introduction

Departing from earlier assertions that terrorist organizations are generally conservative and averse to experimentation and change,[1] there is a growing literature dealing with the capacity of militant actors for flexibility, learning and innovative behavior.[2] However, a large part of this research focuses narrowly on tactical advances, or what Singh has termed “bomb and bullet” innovations.[3] We argue that it is equally, if not even more, important to study learning processes that are directed at more profound transformations of the fundamental approaches of groups. Distinguishing this level from tactical and organizational learning, Crenshaw described such strategic innovation as “shifts that change the fundamental pattern of terrorist challenges to political authority.”[4] Unfortunately, these processes have so far been mostly neglected in the literature. Not only do many researchers focus too narrowly on tactical learning, but studies in the field also often suffer from the fact that their central concept is generally undertheorized in favour of case descriptions or typological contributions, and fail to rigorously link back to the extensive literature on learning developed in other fields. [5] Learning—especially that of organizations—is a notoriously difficult concept in any case and the literature has especially struggled with capturing its cognitive dimension and delineating it from related concepts like innovation.[6] Going beyond narrow definitions linking learning explicitly to material improvements, Singh understands it “as the ability of terrorist groups to change their structures, operations, and/or goals over time.”[7] One of the rare attempts to systematically study such transformations from an organizational learning perspective was done by the RAND Corporation.[8] However, as those RAND researchers were primarily concerned with using this knowledge for counterterrorism purposes, the authors focused largely on how learning capabilities influenced the capacities of groups for violence, and less on strategic deliberations or the dynamics of interpretation processes within organizations themselves. We attempt to address these shortcomings by drawing on a well-established theoretical concept developed outside the context of political violence, namely the organizational learning approach created by Argyris and Schön.[9] This perspective offers a coherent and well-established, yet flexible, conceptual framework for understanding organizational learning, which has also been extensively applied and tested in practice.[10] It

ISSN 2334-3745 26 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 integrates both cognition and action as parts of the learning process and is explicitly focused on the forms of higher-level learning that underlie strategic adjustments and fundamental changes.[11] The authors call such transformations “double-loop learning”, which “occurs when error is detected and corrected in ways that involve the modification of an organization’s underlying norms, policies, and objectives.”[12] As these underlying norms and objectives define the course of action that a group pursues, looking at whether and how modifications of these come about offers important insights into the dynamics of militant campaigns. Crucially, as this approach was originally developed for understanding as well as improving learning processes, it is especially suited for an analysis of learning from the point of view of violent organizations themselves. This allows to better capture the internal reasonings and reflections that determine whether and how a group is able to engage in transformational learning. Specifically, we apply the concept to a study of the Al-Qaeda network, investigating whether, and in which ways, it was able to question not only its immediate modus operandi, but also the basic assumptions its struggle is built on. Jihadist groups have often been described as particular ‘hard cases’ in this regard. For example, argues that jihadists “appear to be incapable of internalizing lessons from past failures.”[13] Likewise, McCabe denies these groups the ability to learn on a deeper level, contending that “at the strategic level they are so badly misinformed as to be almost delusional.”[14] He notes specifically that necessary reforms “would likely be difficult for al Qaeda.”[15] In this text, we seek to reassess these claims from the perspective of a double-loop learning approach by tracing the strategic evolution of Al-Qaeda and its eventual breakaway faction, Hay’at Tahrir al-Sham (HTS). The Concept of Double-Loop Learning Argyris and Schön start with the assumption that “all deliberate action ha[s] a cognitive basis, that it reflect[s] norms, strategies, and assumptions or models of the world.”[16] These mental models work as frames of reference that determine expectations about cause-and-effect relationships between actions and outcomes. Argyris and Schön call these “theories of action”, which include “strategies of action, the values that govern the choice of strategies and the assumptions on which they are based.”[17] In these models, values—or “governing variables”—set performance parameters that actors strive to achieve through their strategies of action.[18] Argyris and Schön differentiate between “espoused theory”, which is advanced to explicitly explain and justify behaviour, and “theory-in-use”, which guides actual behaviour.[19] They assume that organizations also have theories of action that inform their behaviour. In fact, they argue that given the constant turnover of actual members, it “is this theory-in-use, an apparently abstract thing, which is most distinctively real about the [organization].”[20] The theory-in-use of the organization is constructed by individual members in a constant collaborative process and embodied in shared descriptions of the organization, such as policy guidelines or standard operating procedures, but also in tacit knowledge, such as informal lines of communication. Organizational learning, in this sense, is an intentional change in the organizational theory-in-use, traceable through such descriptions as well as the observable patterns of organizational action.[21] According to Argyris and Schön, learning becomes necessary when there is what they call an “error”—a mismatch between the intended outcomes of strategies of action and the actual results. Consequently, they define successful learning in a narrow sense as the “detection and correction of error,” i.e., changes in the organizational approach that bring outcomes more in line with expectations.[22] This happens through continuous processes of self-reflective organizational inquiry. Based on the elements of theories-of-action, Argyris and Schön distinguish two types of learning: In single-loop learning systems, the detection and correction of error connects the outcome in a single loop only to strategies of action, whereas the governing variables remain unchanged. In double-loop learning systems, a double feedback loop “connects the detection of error not only to strategies and assumptions for effective performance, but to the very norms which define effective performance.”[23] Hence, double-loop learning modifies the governing variables’underlying objectives. Single-loop learning to increase the effectiveness of actions is the dominant response to error and is ingrained in routine procedures in any organization. However, especially in changing environments, single-loop learning may actually lead to long-term ineffectiveness, as well as to a reduced capacity for double-loop learning. This is

ISSN 2334-3745 27 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 the case because, when organizations initiate a process of change in order to correct errors without addressing existing norms, a conflict in the norms themselves can emerge. This results in the paradoxical situation where an increase in effectiveness in relation to one goal can lead to a decrease in effectiveness in relation to another. Due to the fact that in single-loop learning systems the governing variables are not questioned, conflicting requirements remain hidden and even may become undiscussable in organizations. This can lead to dilemma situations that Argyris and Schön term “double binds”: If members expose these contradictions, they question norms that are ingrained in everyday operations.[24] If they do not expose an error, they perpetuate a process that inhibits organizational learning. For example, while organizations often officially encourage their members to report mistakes, members often refrain from doing so for fear of being punished as the harbinger of bad news. In contrast, in double-loop learning systems, people acknowledge when there is a mismatch between intention and outcome, share awareness of organizational dilemmas, engage such conflicts through inquiry and decrease double binds.[25] In this second learning loop, the focus shifts from learninghow to better accomplish tasks within a given frame of reference to learning what to do by questioning the frame of reference itself. In other words, while single-loop learning focuses on improving what an organization already does, or “doing the things right,” double-loop learning is concerned with what organizations ought to do, or “doing the right things.”[26] It has to be noted in this regard that such learnings may not necessarily be right in a moral sense. Argyris and Schön emphasize that their description of the mechanisms of organizational learning is neutral and that “any particular example of it may prove to be […] downright evil.”[27] Due to organizational inertia and a tendency to become defensive when confronted with failure, organizations have a tendency to produce learning systems that inhibit the sort of learning that would question their governing variables.[28] Argyris and Schön suggest that in order to double-loop learn, leaders first have to recognize the conflict between incompatible requirements. They must become aware that they cannot correct the error by doing better what they already know how to do, but by engaging in deep organizational inquiry. In this process the focus has to shift from learning concerned with improvement in the performance of tasks to inquiry through which an organization explores the values and criteria that define what improved performance means. This is often inherently conflictual; in fact, as Argyris and Schön remark, “it is often impossible, in the real-world context of organizational life, to find inquiry cleanly separated from the uses of power.”[29] Such inquiry necessitates a capacity for self-criticism, open reflection and tolerance for personal risk in order to overcome double binds and “mak[e] the undiscussable and its undiscussability discussable.”[30] While organizations should strive to develop cultures conducive to double-loop inquiries, Argyris and Schön concede that these systems are empirically rare and an ideal type that can only be approximated.[31] In reality, it is also difficult to speak of an organization having one single learning system. Theories-in-use are systemic structures composed of many interconnected parts on different levels of the organization. These can be more particular and local or more general and global, more fundamental to the structure or more peripheral. Hierarchies of norms, strategies and assumptions are also not always clear-cut. In reality, therefore, it is more useful to speak of organizational learning as more or less double loop, with learning being not dichotomous but a “continuous concept of depth of learning.”[32] The more organizations inquire into governing variables that are fundamental to their theory of action, the more they approach double-loop learning.

Double-Loop Learning in the Al-Qaeda Network Given the difficulties described above, terrorist groups should have a particularly hard time establishing double- loop learning systems.[33] Militant groups usually operate in the underground and face an existential security situation, creating a situation of “causal ambiguity” in which it is difficult to link events back to action and strategies.[34] Moreover, closed collectives tend to establish a strong sense of “groupthink” and a “tendency toward self-censorship and consensus building,” which is detrimental to deep organizational inquiry.[35] The latter tendency is also aggravated by the often rigid ideologies these groups follow, presumably making jihadi organizations like Al-Qaeda particularly reluctant to question their guiding norms and assumptions. ISSN 2334-3745 28 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

However, as traditional research has underestimated the ability of terrorist groups to learn in general, the literature might still underestimate their capability for deeper inquiry and learning. In the following, we trace the strategic trajectory of Al-Qaeda to demonstrate that applying the conceptual framework of Argyris and Schön reveals that jihadists were indeed capable of profound organizational change and learning, which ultimately even lead to the split of the Syrian branch of the organization. From Strategic Revolution to Double Binds At the end of the 1990s, Osama Bin Laden and Ayman Al-Zawahiri initiated a revolution in jihadist thinking by setting the focus on what they termed the “far enemy” of the United States and the West.[36] Al-Qaeda built this new cohesive theory-of-action on the notion that struggles so far had failed mainly because of the support given to local regimes by the United States. Based on the idea that the downfall of the was the result of its defeat in Afghanistan, which the jihadists claimed as their success, they drew the lesson that America could likewise be forced to withdraw from Muslim countries.[37] From this, Al-Qaeda derived a clear set of governing variables: (1) strike against Western and especially American targets; (2) establish safe havens in Muslim countries; (3) gain the support of the Muslim masses; (4) be the vanguard and leader of the united jihadi movement.[38] Crucially, these building blocks formed the cornerstones of Al-Qaeda’s jihad both in espoused theory and theory-in-use in the latter half of the 1990s and throughout the 2000s. The 9/11 attacks can be seen as a clear example of single-loop learning: by escalating the level of violence and directly striking the U.S. homeland, Al-Qaeda innovated their actions within their given framework—doing ‘better’ what they already knew how to do, addressing the problem that earlier attacks had not compelled America to change its policies. However, this approach largely failed. Although Al-Qaeda proved to be more resilient than observers expected at the time, the changes the organization underwent in the decade following 9/11 can still be described as single-loop learning: “Unprepared to change their doctrine, they had to adjust their strategy.”[39] The main innovation keeping the movement alive was organizational in nature and involved the de-centralization and franchising of the once strictly hierarchical group. This devolution of powers, however, in effect diluted the far enemy strategy, as groups with local roots were focused first and foremost on their local insurgencies.[40] In the terms of Argyris and Schön, this created conflicting requirements for affiliate commanders, as they were encouraged by the leadership to focus their attention on Western targets, while their main interests remained regional. Merely adapting the organizational structure did not resolve the deeper problems that single-loop learning cannot address, and contributed to the undiscussability of governing variables, as Bin Laden was as yet unprepared to admit strategic mistakes. To continue the fight under existing norms perpetuated the inherent contradictions in the governing variables: provoking international intervention made it much harder, if not impossible, to establish territorial safe havens; moreover, the violence and strict interpretation of Sharia— especially exhibited by its most active affiliate, Al-Qaeda in Iraq (AQI)—reduced Al-Qaeda’s appeal to the majority of Muslim populations.[41] The leadership was aware of these problems; crucially, however, they voiced these concerns only in private communications. As Al-Zawahiri famously noted in a letter from July 2005 to AQI leader Musab al-Zarqawi, “this subject is complicated and detailed. I have brought it up here so as not to address the general public on something they do not know.” [42] The franchising strategy had also created conflicting requirements for the leadership: in order to minimize damage to the organization’s brand, public rebukes of affiliates’ tactics would have been necessary—however, this would have exposed not only the leadership’s lack of authority but also discord in the jihadist movement.[43] In the words of Argyris and Schön, this represented a typical double bind. Engaging in Deep Organizational Inquiry Consequently, at the beginning of this decade Al-Qaeda seemed to be on the back foot.[44] However, most experts agree that the organization has weathered the storms remarkably well.[45] We argue that this is largely due to the fact that the Al-Qaeda leadership, after the failures of the 2000s, finally started a process of deeper organizational inquiry. In 2010 Bin Laden announced a “new phase of assessing Jihad activities,” inviting the reader to “brainstorm” and improve upon his ideas.[46] He expressed the “need [for] an advisory reading, with

ISSN 2334-3745 29 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 constructive criticism to our entire policy and publications,” followed by soliciting feedback about the agreed- upon reforms from “the leaders of the regions”; by emphasizing the “importance of secrecy in all of that,” Bin Laden made clear that this was an internal investigation, testifying that this was a serious engagement with Al- Qaeda’s principles and not merely a propaganda effort.[47] Bin Laden’s primary concern was with the inability of Al-Qaeda to generate mass support.[48] Additionally, he acknowledged the weakness of the movement, and warned against attacks when “the power of the brothers is not ready.”[49] The inquiry into its governing variables became even more profound after the death of Bin Laden at the time of the Arab Spring, which, contrary to many Western analysts who interpreted it as the nail in the coffin for Al-Qaeda, leadership member Atiyatullah al-Libi called a “historic opportunity.”[50] It precipitated a local turn that married a more conciliatory approach towards ordinary Muslims and independent armed actors with a renewed focus on anti-regime insurgency. Instead of trying to impose its version of Islam immediately, affiliates were advised to be more lenient; instead of trying to take control of insurgencies and sideline other groups, operatives were to integrate into the local scene, establishing relationships and playing down global connections. For example, when Al-Qaeda in the Islamic Maghreb (AQIM) and their local allies took control of northern Mali in 2012, Al-Qaeda’s general manager Nasir al-Wuhayshi advised AQIM emir Abdelmalek Droukdel to take a gradual approach, arguing that “you can’t beat people for drinking alcohol when they don’t even know the basics of how to pray.”[51] Crucially, these efforts were supported by another turn away from earlier practices: Instead of relaying advice only in private, which had proved ineffectual in Iraq, the leadership published explicit guidelines as part of a deliberate “rebranding campaign.”[52] The General Guidelines for Jihad instruct jihadis not only to “refrain from harming Muslims,” but to “generally avoid fighting those who have not raised arms against us.”[53] Instead of enforcing its understanding of Sharia law, the focus should be on “spreading awareness amongst the general public.”[54] In stark contrast to earlier work where Al-Zawahiri strongly justified the killing of civilians,[55] the 2017 Code of Conduct of Al-Qaeda in the Indian Subcontinent (AQIS) explicitly instructs jihadis to refrain from “attacking even those targets that are permissible in Shari’ah, but [are] not beneficial for the jihadi movement.”[56] These documents were also designed to draw a clear distinction to the extremism of the Islamic State (ISIS), which Al-Qaeda openly criticized, thereby demonstrating its willingness to sacrifice the norm of maintaining the unity of the jihadi movement, while making clear its claim to authority. These contrasting approaches can in fact be seen as different lessons drawn from the experiences in the decade before: while Al-Qaeda focused on regaining public trust and influence in local insurgencies through moderation and tactical cooperation, the direct successor of AQI tried to preempt another “Sunni Awakening” by eliminating any potential rival to its power and ideological interpretation as early as possible. From a learning perspective, therefore, while Al- Qaeda’s trajectory can be seen as moving towards double-loop learning, ISIS’s represents a form of single-loop learning, in which the group strove to remain on top by means of an even more brutal application of its tactics in Iraq. Al-Qaeda has largely been consistent in its approach, even claiming the moral high ground when it reemphasized its vow to exclude “places of worship” and avoid civilian targets in its call for revenge after the Christchurch attack.[57] Interestingly, this puts the spotlight on another de facto revision of a core norm: while ISIS staged and inspired spectacular terrorist attacks around the world, Al-Qaeda de facto all but abandoned its targeting of the West, relegating fiery attacks on the US and its allies essentially to espoused theory.[58] Overall, Evans was right when he predicted Al-Qaeda’s turn toward “a more Maoist attitude.”[59] Al-Qaeda has exhibited a remarkable ability to question its strategic approach and set new priorities in its governing variables in the last decade. The split from what would become ISIS can be interpreted as a logical consequence of this learning process, which ISIS was not following. In contrast, the split that later occurred between Al-Qaeda and its Syrian branch was in a sense precipitated by the unwillingness of the former to go further in its questioning of norms.[60]

ISSN 2334-3745 30 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

A Step Too Far: From Jabhat al-Nusra to Hay’at Tahrir Al-Sham The group that today is known as Hay’at Tahrir al-Sham started out as a small expeditionary force sent to Syria 2011 by the (ISI), then still aligned with Al-Qaeda. Led by Abu Muhammad Al-Jolani, this new group, established under the name Jabhat al-Nusra (JN), from the beginning charted a course that was somewhat independent of its nominal Iraqi superiors. It eschewed the latter’s brutal tactics and ideological rigidity in favour of presenting a more cooperative image. Ultimately, JN’s insubordinations led to the split in the global jihadi movement, when ISI attempted to bring it under its direct control in 2013, but was rebuffed by Al-Jolani and Al-Zawahiri himself.[61] Although temporarily eclipsed by the military successes of ISIS and its subsequent declaration of the Caliphate in mid-2014, “a relatively more restrained Al-Qaeda […] largely doubled down on its approach,” with JN exemplifying the modified governing variables.[62] Having weathered the shock of ISIS’s expansion, the group’s strategy was characterized by an emphasis on “localism, gradualism, and controlled pragmatism.”[63] In order to appeal to a local audience, more extreme Salafi-jihadist norms were sidelined in favour of creating a reputation as an indispensable ally of the Syrian revolution. In order to avoid attacks by Western and Russian airpower, JN even took the unprecedented step of declaring its intention “not to use al-Sham as a base to launch attacks on the West or Europe,” thereby bringing espoused theory into line with actual theory-in-use.[64] However, it became increasingly clear that these steps were not enough to secure the group’s long-term objectives. Neither did the announcement placate the US or the intervening , nor were rebel factions convinced that they could trust JN. In the Syrian arena, the continued incompatibility between Al-Qaeda’s governing variables of localism and a still-espoused global agenda created double binds for local commanders. The allegiance to Al-Qaeda and its reputation was the main obstacle for other Syrian groups in establishing a unified front with JN.[65] In an attempt to break this impasse, Al-Jolani— in an unprecedented move for an Al-Qaeda affiliate [66]—rebranded JN 2016 as the more inclusive Jabhat Fateh al-Sham (JFS), declaring that it would no longer have any affiliation with an “external entity.”[67] This decision was accompanied by extensive internal debates of organizational inquiry, which included senior Al-Qaeda figures.[68] Nevertheless, the move proved to be more controversial than initially thought.[69] Not only did large groups of loyalists defect, but as it turned out, Al-Zawahiri did not agree with the rebranding, calling it an “act of disobedience” and demanding its reversal.[70] This controversy points to an incomplete organizational inquiry—existing double binds were only ostensibly solved and central elements remained undiscussable, so that the parties emerged with different impressions of what the change was about. From the perspective of a unified Al-Qaeda, this essentially amounted to a failure of an attempt to double-loop learn. From the perspective of JFS, however, it marked the starting point of its independent existence. Al-Jolani insisted on the break, as he realized that in order to adapt to the increasingly difficult environment of the conflict, he had to prioritize among conflicting norms in order to create a more durable, unified jihadi military front. Initially, however, this hope was disappointed, as other rebel factions remained wary of JFS. Tensions escalated into open fighting, while at the same time pressure increased with the military intervention of Turkey, forcing JFS to go further in its pragmatism. Although unable to secure a broad Sunni alliance under its hegemony, in January 2017 it announced a merger with smaller Islamist groups and rebranded again as Hay’at Tahrir al- Sham.[71] Al-Zawahiri again strongly criticized the apparent strategy of decoupling the Syrian jihad from the global struggle, announcing that “the jihad in ash Sham is a jihad of the entire Muslim Ummah, […] not a jihad of the people of Syria,” as well as accusing HTS of “seek[ing] not to be hostile to America” and “planning to evade the pledges of bayat.”[72] Although HTS attempted to refute these accusations—sometimes rather half- heartedly—it seems clear that the group went further in its pragmatic re-evaluation of the governing variables that emerged from Al-Qaeda’s learning process than the central leadership was prepared to do. This becomes especially apparent in light of how HTS has dealt with the increased role that Turkey has played in the Syrian conflict since 2017. While Al-Qaeda sees Erdogan as not much better than the Arab apostate regimes,[73] HTS officials argued that “different opinions existed on […] the legitimacy of Turkey’s President Erdogan and relationships with foreign governments.”[74] In late 2017 HTS even accepted a Turkish military presence in Idlib, the last opposition stronghold, and the establishment of a demilitarized zone, indirectly ISSN 2334-3745 31 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 also submitting to the Astana negotiations, a format universally rejected by jihadists.[75] The ensuing furious criticism by Al-Qaeda-aligned ideologues forced HTS to engage in further inquiry.[76] In a subtle, but within the rigid framework of Salafi-jihadism relatively far-reaching, reinterpretation of core norms, HTS claims that it does not violate the ban on cooperation with apostate regimes when certain minimal conditions are met. [77] In a pragmatic recognition of power realities on the ground, HTS media official Muhammad Nazzal argued: “No one says that the Turks’ entrance to these points is some desirable interest; rather, it’s the lesser of two evils.”[78] With this, HTS effectively subscribed to a logic of ends justifying the means, potentially open to further compromises, implying a focus on wartime strategy above methodological purity. In the terms of Argyris and Schön, these changes seem clearly indicative of a form of double-loop learning, reacting to mismatches between the original approach and realities on the battlefield. Given that there is no imminent military solution to the Syrian conflict, the organizational learning of HTS could potentially evolve the group even farther into a kind of “Neo-Qaeda”,[79] transitioning into a quasi- recognized political actor “akin to in Gaza or Hezbollah in Lebanon.”[80] While it would retain most of its hard-line religious beliefs, the norms underlying its political strategies would have to be more flexible. This does not mean that its actions would be any less violent—in fact, despite its moderation, HTS has aggressively asserted itself as the dominant player in Idlib. From a double-loop learning perspective, however, the group has clearly shown a willingness to inquire into its founding norms, confronting the realities of its situation and correcting the “errors” of mixing global and national jihad or remaining ideologically pure in the face of overwhelming opposition.

Conclusion In this Research Note, we attempted to enhance the understanding of the learning of terrorist groups beyond the tactical and organizational levels usually focused on in the literature. We did so by drawing on a theoretical approach to organizational learning developed outside of the context of political violence. Changes to fundamental strategic approaches and underlying norms are generally seen as difficult for militant actors, and especially for jihadist organizations. In 2010 McCabe outlined five elemental changes that a future jihadist group would have to undertake compared to the then state of Al-Qaeda in order to become successful: adopting a more limited agenda of defensive jihad, stopping attacks overseas, concentrating on military and security targets, avoiding conflicts with other Muslims, and minimizing Muslim civilian casualties.[81] As this Research Note has demonstrated, Al-Qaeda in fact fulfilled or approximated all of these elements. In a process of organizational inquiry, the organization revised its strategy and prioritized a more local, less brutal and ostensibly conciliatory approach over its global agenda and claim to superiority. Of course, as Stenersen remarks, strategic flexibility “does not mean: ‘anything goes’.”[82] This became apparent in the conflict between the Al-Qaeda leadership and its Syrian affiliate, which was prepared to inquire even more in its governing norms, essentially rejecting global terrorism and pragmatically concentrating on its national setting. With the open entry of Turkey into the Syrian arena, the group now rebranded as HTS went even further, explicitly reinterpreting key aspects of its Salafi-jihadi credentials in order to be able to negotiate with the supposedly apostate power. Whether the described changes qualify as double-loop learning is ultimately a question of interpretation. As Argyris and Schön have stated, in reality there is no dichotomy of learning but a continuum, and organizations consistently and fully committed to double-loop learning systems are essentially an ideal type. Clearly, Al- Qaeda is far from changing its core Salafi-jihadi convictions and some of its modifications can be seen as essentially representing strategic adjustments, generally in line with the spirit of most of its original governing variables. However, as Argyris and Schön note, changing strategies can in effect be almost as important as changing norms, when those strategies are “fundamental to the [organization’s] theory of action.”[83] As the evolution of HTS shows, what start out as modifications of strategies due to external pressure may entail more fundamental changes of norms down the line.[84]

ISSN 2334-3745 32 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

The approach by Argyris and Schön helps to understand the learning process of terrorist groups as a process in which incompatible requirements and double binds are tackled in organizational inquiries and solved by prioritizing objectives in theories-in-use. More research is necessary to situate this framework squarely in the existing theories on learning in terrorist organizations. In order to learn more about the conditions that facilitate or inhibit organizational learning, future research should therefore explore the ways in which the internal and external conditions of organizations affect the capacity for such inquiry, and how the lessons of double-loop learning are implemented. Moreover, double-loop learning does not necessarily have to be correlated with moderation. Radicalization can also be seen as a process of revising one’s norms, for example when so far non-violent protestors conclude, in the face of repression, that their pacifist governing variables is inhibiting rather than precipitating change. Applying this framework to such cases could therefore also yield important insights.

About the Authors: Dr. Michael Fürstenberg is Research Fellow in the Max Planck Research Group ’How ‘Terrorists’ Learn’ at the Max Planck Institute for Social Anthropology in Halle (Saale). He holds a PhD in political science from TU Braunschweig and was a Visiting Researcher at the University of Maryland. His research concentrates on strategic choices of types of violence, terrorism in civil war, and, most recently, far-right terrorism. Dr. Carolin Görzig is Head of the Max Planck Research Group ‘How ‘Terrorists’ Learn’. The Research Group deals with processes of transformation and learning of violent organizations and looks at the context in which these processes unfold. She wrote her PhD at the University of Munich on the topic “Talking to Terrorists—Concessions and the Renunciation of Violence.” Based on field research in several countries, she researches how violent groups complete strategic changes and make the decision to abandon violence.

Notes [1] Brian M. Jenkins, “Defense against Terrorism,” Political Science Quarterly 101, 5 (1986): 773.; J. B. Bell, “Revolutionary Dynamics: The Inherent Inefficiency of the Underground,”Terrorism and Political Violence 2, 2 (1990): 193–211.; Bruce Hoffman, “Terrorist Targeting: Tactics, Trends, and Potentialities,” Terrorism and Political Violence 5, 2 (2007): pp. 12–29. [2] See e.g. Brian A. Jackson, John C. Baker, Kim Cragin, John Parachini, Horacio R. Trujillo, and Peter Chalk, Aptitude for Destruction, Volume 2: Case Studies of Organizational Learning in Five Terrorist Groups (Santa Monica, CA: RAND Corporation, 2005).; James J. F. Forest (Ed.), Teaching Terror: Strategic and Tactical Learning in the Terrorist World (Lanham, Md.: Rowman & Littlefield, 2006).; Dolnik, Understanding Terrorist Innovation: Technology, Tactics and Global Trends (Hoboken: Taylor & Francis, 2007).; Assaf Moghadam: “How Al Qaeda Innovates,” Security Studies 22, 3 (2013): pp. 466–497.; Paul Gill, John Horgan, Samuel T. Hunter, and Lily D. Cushenbery, “Malevolent Creativity in Terrorist Organizations,” The Journal of Creative Behavior 47, 2 (2013): pp. 125–151.; Magnus Ranstorp and Magnus Normark, Understanding Terrorism Innovation and Learning: Al-Qaeda and beyond (: Routledge, 2015).; Paul Gill, “Tactical Innovation and the Provisional Irish Republican Army,” Studies in Conflict & Terrorism 40, 7 (2016): pp. 573–85; Gary Ackerman, “‘Designing Danger’: Complex Engineering by Violent Non-State Actors: Introduction to the Special Issue,” Journal of Strategic Security 9, 1 (2016): pp. 1–11; Carolin Görzig, “Terrorist Learning in Context – the Case of Al Qaeda in the Islamic Maghreb,” Critical Studies on Terrorism 12, 4 (2019): pp. 629–648. [3] Rashmi Singh, “A Preliminary Typology Mapping Pathways of Learning and Innovation by Modern Jihadist Groups,” Studies in Conflict & Terrorism 40, 7 (2017): pp. 624–644, at p. 627. [4] Martha Crenshaw, “Innovation: Decision Points in the Trajectory of Terrorism”; in: Terrorist Innovations in Weapons of Mass Effect: Preconditions, Causes, and Predictive Indicators, edited by Maria J. Rasmussen and Mohammed M. Hafez (Washington, D.C. 2010): pp. 35–50, at p. 36. [5] Mohammed M. Hafez and Maria J. Rasmussen, “Innovation in WMD Terrorism: A Guide for Workshop Participants,” In Terrorist Innovations in Weapons of Mass Effect: Preconditions, Causes, and Predictive Indicators, edited by Maria J. Rasmussen and Mohammed M. Hafez (Washington, D.C. 2010), pp. 27–34, at p. 29; Louise Kettle and Andrew Mumford, “Terrorist Learning: A New Analytical Framework,” Studies in Conflict & Terrorism 40, 7 (2017), p. 2. [6] For learning on the part of organizations and states in general, see Bo Hedberg, “How organizations learn and unlearn”; in:

ISSN 2334-3745 33 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Handbook of Organizational Design: Remodeling Organizations and their Environments, edited by Paul C. Nystrom and William H. Starbuck (Oxford: Oxford University Press, 1981), pp. 3–27.; Philip E. Tetlock, “Learning in U.S. and Soviet Foreign Policy: In Search of an Elusive Concept”; in: Learning in U.S. and Soviet foreign policy, edited by George W. Breslauer and Philip E. Tetlock (Boulder, CO: Westview Press, 1991), pp. 20–61.; Jack Levy, “Learning and Foreign Policy: Sweeping a Conceptual Minefield,” International Organization 48, 2 (1994): pp. 279–312.; D. Miller, “A Preliminary Typology of Organizational Learning: Synthesizing the Literature,” Journal of Management 22, 3 (1996): pp. 485–505.; Mark Easterby-Smith, Mary Crossan, and Davide Nicolini, “Organizational Learning: Debates Past, Present And Future,” Journal of Management Studies 37, 6 (2000): pp. 783–796. For conceptual discussions of learning on the part of terrorist actors in particular, see Brian A. Jackson, John C. Baker, Kim Cragin, John Parachini, Horacio R. Trujillo, and Peter Chalk, Aptitude for Destruction. Volume 1: Organizational Learning in Terrorist Groups and Its Implications for Combating Terrorism (Santa Monica, CA: Rand Corporation, 2005).; Kettle and Mumford, “Terrorist Learning.” [7] R. Singh, “Preliminary Typology,” pp. 626–627. [8] Jackson et al, “Aptitude for Destruction Vol 1,” p. 10. [9] Chris Argyris and Donald A. Schön, Organizational Learning: A Theory of Action Perspective (Reading, Mass: Addison-Wesley, 1978).; Chris Argyris and Donald A. Schön, Organizational Learning II: Theory, Methods, and Practice (Reading: Addison Wesley, 1996).; Mohamed Chatti, Matthias Jarke, and Ulrik Schroeder, “Double-Loop Learning,” Encyclopedia of the Sciences of Learning, edited by Norbert M. Seel (Boston, MA: Springer, 2012), pp. 1035–1037. This approach has been employed before to study a radical group in Carolin Görzig, “Deradicalization through Double-Loop Learning? How the Egyptian Gamaa Islamiya Renounced Violence,” Studies in Conflict & Terrorism (2019); URL: https://www.tandfonline.com/doi/full/10.1080/1057610X.2019.1680193. [10] Matthias Finger and José M. Asún, Adult Education at the Crossroads: Learning Our Way Out. Global Perspectives on Adult Education and Training (London: Zed Books, 2001), p. 45.; Viviane M.J. Robinson, “Descriptive and Normative Research on Organizational Learning: Locating the Contribution of Argyris and Schön,” International Journal of Educational Management 15, 2 (2001): pp. 58–67. Argyris and Schön draw their empirical examples largely from the world of business, and Argyris in particular has been engaged in interventions attempting to improve the organizational learning of companies. Although there are of course important differences between private-sector companies and violent non-state actors, as Jackson et al. remark “terrorist groupsare organizations” (Jackson et al., “Aptitude for Destruction Vol 1,” p. 9). Analogies between business organizations and violent actors have also been drawn in Ray Takeyh and Nikolas Gvosdev, “Do Terrorist Networks Need a Home?” The Washington Quarterly 25, 3 (2010): pp. 97–108, and in Shapiro, The Terrorist’s Dilemma: Managing Violent Covert Organizations (Princeton, Oxford: Princeton University Press, 2013). [11] Anders Örtenblad, “Learning, Double-Loop,” International Encyclopedia of Organization Studies, edited by Stewart Clegg and James R. Bailey (Thousand Oaks CAL: SAGE, 2008), pp. 805–806. [12] Argyris and Schön, “Organizational Learning,” pp. 2–3. [13] Mohammed M. Hafez, “Fratricidal Jihadists: Why Islamists Keep Losing their Civil Wars,” Middle East Policy 25, 2 (2018): pp. 86–99. [14] Thomas R. McCabe, “The Strategic Failures of al Qaeda,”Parameters 40, 1 (2010): pp. 60–71, at p. 60. [15] Ibid, p. 69. [16] Argyris and Schön, “Organizational Learning,” p. 10. [17] Argyris and Schön, “Organizational Learning II,” p. 13. [18] Ibid., p. 92; Argyris and Schön are somewhat ambiguous with their terminology, speaking of “values”, “norms”, “policies” “objectives” or “governing variables” largely interchangeably. [19] Argyris and Schön, “Organizational Learning,” p. 11. [20] Ibid., p. 16. [21] Ibid., p. 28. [22] Ibid., p. 2. This is arguably a somewhat limited interpretation of learning compared to other definitions. For a brief overview, see M. Leann Brown and Michael Kenny, “Organizational Learning: Theoretical and Methodological Considerations,” Organizational Learning in the Global Context, edited by M. Leann Brown, Michael Kenney and Michael Zarkin (Aldershot: Ashgate, 2006), pp. 1–21, at pp. 3–5. We contend, however, that the explicit focus of this conceptualization on actual change and (subjective) improvement allows us to better capture and trace processes that organizations themselves consider as learning. [23] Ibid., p. 22. [24] Ibid., pp. 3–4.

ISSN 2334-3745 34 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

[25] Ibid., pp. 312–313. [26] Chatti, Jarke, and Schroeder, “Double-Loop Learning,” p. 1035. [27] Argyris and Schön, “Organizational Learning II,” p. 20. [28] Argyris and Schön, “Organizational Learning,” pp. 3–4. [29] Argyris and Schön, “Organizational Learning,” p. 24. [30] Chris Argyris, “Making the Undiscussable and Its Undiscussability Discussable.” Public Administration Review 40, 3 (1980): pp. 205–213. [31] Argyris and Schön, “Organizational Learning II,” p. 111–112. [32] Argyris and Schön, “Organizational Learning,” p. 26. [33] Görzig, “Terrorist Learning in Context,” p. 7. [34] Jackson et al., “Aptitude for Destruction Vol 1,” pp. 58–59. [35] Gordon H. McCormick, “Terrorist Decision Making,” Annual Review of Political Science 6, 1 (2003): pp. 473–507, at pp. 488–489. [36] Fawaz A. Gerges, The Far Enemy: Why Jihad Went Global (Cambridge: Cambridge University Press, 2005). [37] This view was seemingly validated when the U.S. left Somalia after the killing of 18 soldiers, leading Bin Laden to the misguided assumption that American power was a mere “paper tiger.” - Daniel Byman, Al Qaeda, the Islamic State, and the Global Jihadist movement: What Everyone Needs to Know (Oxford: Oxford University Press, 2015), p. 51. [38] In his Knights under the Prophet’s Banner, Ayman Al-Zawahiri set out the goals of the movement in no unclear terms: (1) “[M] ove the battle to the enemy’s ground”; (2) “Armies achieve victory only when the infantry takes hold of land. Likewise, the mujahid Islamic movement will not triumph against the world coalition unless it possesses a fundamentalist base in the heart of the Islamic world”; (3) “[M]ust come closer to the masses […]; The Muslim nation will not participate [in jihad] unless the slogans of the Mujahideen are understood by the masses”; (4) “Loyalty to the leadership and the acknowledgement of its precedence and merit represents a duty that must be emphasized and a value that must be consolidated”; “need for a scientific, struggling, and rational leadership that could guide the nation.” Ayman Al-Zawahiri Knights under the Prophet’s Banner (London: Asharq al-Awsat, 2001), pp. 60–63; URL: https://assets.documentcloud.org/documents/1507027/2001-12-02-knights-under-the-prophets-banner-en.pdf. [39] Michael W. S. Ryan, Decoding Al-Qaeda’s strategy: The Deep Battle against America (New York: Columbia University Press, 2013), p. 57. [40] Mendelsohn, “The al-Qaeda Franchise,” pp. 67–68. [41] Brian Fishman, Dysfunction and Decline: Lessons Learned from Inside Al-Qa`ida in Iraq (Combatting Terrorism Center at West Point, 2009); URL: https://ctc.usma.edu/dysfunction-and-decline-lessons-learned-from-inside-al-qaida-in-iraq/. [42] Ayman Al-Zawahiri, “Letter to al-Zarqawi” (Office of the Director of National Intelligence, 2005); URL: https://fas.org/irp/ news/2005/10/letter_in_english.pdf, p. 8. [43] Tricia Bacon, and Elizabeth G. Arsenault 2017. “Al Qaeda and the Islamic State’s Break: Strategic Strife or Lackluster Leadership?” Studies in Conflict & Terrorism 42, 3 (2019), pp. 229–263. [44] A sentiment seemingly shared even by the influential jihadist ideologies Abu Muhammad al-Maqdisi and Abu Qatada.- Shiv Malik, Mustafa Khalili, Spencer Ackerman, and Ali Younis, “How Isis Crippled al-Qaida: The Inside Story of the Coup that Has Brought the World’s Most Feared Terrorist Network to the Brink of Collapse,” The Guardian, June 10, 2015: https://www.theguardian. com/world/2015/jun/10/how-isis-crippled-al-qaida. It has since been suggested that their interviews were a deliberate ruse to divert attention from Al-Qaeda. See Daveed Gartenstein-Ross and Nathaniel Barr, “How al-Qaeda Survived the Islamic State Challenge,” Current Trends in Islamist Ideology 21 (2017): pp. 50–68, at p. 58; URL: https://s3.amazonaws.com/media.hudson.org/files/ publications/20170331CurrentTrends21.pdf. [45] Colin P. Clarke and Assaf Moghadam, “Mapping Today’s Jihadi Landscape and Threat,”Orbis 62, 3 (2018): pp. 347–371, at pp. 349–350; Bruce Hoffman, “Al-Qaeda’s Resurrection” (Council on Foreign Relations, 2018); URL: https://www.cfr.org/expert-brief/ al-qaedas-resurrection. [46] Osama Bin Laden, “Letter to `Atiyya,” Abbotabad Document SOCOM-2012-0000019, 2010, p. 3; URL: http://www.jihadica.com/ wp-content/uploads/2012/05/SOCOM-2012-0000019-Trans.pdf. [47] Ibid., p. 15.

ISSN 2334-3745 35 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

[48] Undoubtedly under the impression of the experiences in Iraq: “Amongst the mistakes made were the killing of some, the Muslims did not understand the justification behind allowing their killing [leading] to the loss of the Muslims sympathetic approach towards the Mujahidin” (ibid., p. 4). [49] Ibid., pp. 5–6. [50] Atiyatullah al-Libi, “The People’s Revolt… the Fall of the Corrupt Arab Regime… the Demolishment of the Idol of Stability… and the New Beginning,” The Global Media Islamic Front, 2011; URL: http://gtrp.haverford.edu/statement/ATI20110216/. [51] Bill Roggio, “Wuhayshi Imparted Lessons of AQAP Operations in Yemen to AQIM,” The Long War Journal, August 12, 2013; URL: https://www.longwarjournal.org/archives/2013/08/wuhayshi_imparts_les.php. [52] Daveed Gartenstein-Ross and Nathaniel Barr, “Extreme Makeover, Jihadist Edition: Al-Qaeda’s Rebranding Campaign,” War on the Rocks, September 3, 2015; URL: https://warontherocks.com/2015/09/extreme-makeover-jihadist-edition-al-qaedas-rebranding- campaign/. [53] Ayman Al-Zawahiri, “General Guidelines for Jihad,” As-Sahab Media, September 2013, p. 5.; URL: https://azelin.files.wordpress. com/2013/09/dr-ayman-al-e1ba93awc481hirc4ab-22general-guidelines-for-the-work-of-a-jihc481dc4ab22-en.pdf. [54] Ibid., p. 3; The document is indicative of its genesis – in some parts, it still shows the old preferences, emphasizing that “[militarily], focus should be maintained on constantly weakening the head of international unbelief” while “entering into an armed clash with the local regimes” should be avoided (ibid, pp. 3–4). Because at the time of its publication the reality on the ground had already shifted to insurgent warfare, this necessitates some awkward balancing acts, where al-Zawahiri lists exceptions to the latter rule to accommodate essentially all countries in which jihadist groups were already fighting (ibid, p. 2) and maintains that “focusing on the head of disbelief (America) does not conflict with the right of the Muslim masses to wage jihad […] against those who oppress them” (ibid). Events on the ground also demonstrated that strategic revisions need time to be implemented: although AQIM’s emir Droukdel relayed the advice to take a gradual approach to the local commanders, many of them nevertheless implemented a harsh form of Sharia, alienating the population and paving the way for the French counteroffensive. As Gartenstein-Ross and Barr remark, “uneven implementation often undercut Al-Qaeda’s early rebranding efforts”; Gartenstein-Ross and Barr, “Extreme Makeover.” [55] Ayman Al-Zawahiri, The Exoneration: A Treatise on the Exoneration of the Nation of the Pen and Sword of the Denigrating Charge of Being Irresolute and Weak, (2008); URL: https://fas.org/irp/dni/osc/exoneration.pdf. In this angry reaction to the criticisms of his former mentor, Sayid Imam Abdel-Aziz Al-Sharif, he argued, based on a selective reading of Hadiths, that “women and young boys, that is, those who may not be killed separately, may be killed if they are mixed with others,” drawing an analogy to the historic use of catapults, which were permitted to use “even if young boys, women, old people, and monks are killed along with the others because it is permitted to attack them collectively” (ibid, p. 39). He explicitly applied this logic also to Muslims “if they mix with others and one cannot avoid killing them along with the others” (ibid., p. 41). [56] Al-Qaeda in the Subcontinent, “Code of Conduct,” As-Sahab Media Subcontinent, June 2017, p. 2; URL: https://azelin.files. wordpress.com/2017/06/al-qacc84_idah-in-the-indian-subcontinent-22code-of-conduct22-en.pdf. [57] Al-Qaeda General Command, “Let Our Mothers Trust Is If We Do Not Win the Blood of the Worshipers,” As-Sahab Media, March 23, 2019; URL: https://jihadology.net/2019/03/23/new-statement-from-al-qaidahs-general-command-let-our-mothers-trust- is-if-we-do-not-win-the-blood-of-the-worshipers/. The full passage reads: “Target the crusader fighters in their bases and places of gathering, not in their churches and places of worship. And avoid targeting who God and his messenger ask you to not target them. Based on […] our noble morals of war.” [58] Tore R. Hamming, “Jihadi Competition and Political Preference,” Perspectives on Terrorism 11, 6 (2017): pp. 63–88; Hassan Hassan, “Sunni Jihad Is Going Local: Future Extremists Will Focus Not on Exporting Violence to the West, but on Building Influence in Their Own Communities,”The Atlantic, February 15, 2019; URL: https://www.theatlantic.com/ideas/archive/2019/02/sunni-jihad- turns-away-transnational-terrorism/582745/. Undoubtedly, this was to a large degree the result of the ascension of al-Zawahiri to Al-Qaeda’s number one, as the Egyptian had a long-standing preference for fighting the near enemy; see Sajjan Gohel, “Deciphering Ayman Al-Zawahiri and Al-Qaeda’s Strategic and Ideological Imperatives,” Perspectives on Terrorism 11, 1 (2017): pp. 54–67; Michael Scheuer, “The Zawahiri Era,” The National Interest 115 (2011): pp. 18–26. However, this is not unusual in learning processes, where “it is often impossible, in the real-world context of organizational life, to find inquiry cleanly separated from the uses of power” (Argyris and Schön, “Organizational Learning,” op. cit., p. 24). [59] Ryan Evans, “From Iraq to Yemen: Al-Qa`ida’s Shifting Strategies,” CTC Sentinel 3, 10 (2010): pp. 11–14, at p. 14. [60] Charles Lister, “The Syria Effect: Al-Qaeda Fractures“ (Hudson Institute, 2019):https://www.hudson.org/research/15533-the- syria-effect-al-qaeda-fractures. [61] John Turner, “Strategic Differences: Al Qaeda’s Split with the Islamic State of Iraq and al-Sham,” Small Wars & Insurgencies 26, 2 (2015): pp. 208–25. [62] Hassan, “Two Houses Divided,” p. 5.

ISSN 2334-3745 36 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

[63] Charles Lister, “The Dawn of Mass Jihad: Success in Syria Fuels al-Qa’ida’s Evolution,” CTC Sentinel 9, 9 (2016): pp. 13–20, at p. 15. [64] The Guardian, “Syria Not a Launching Pad for Attacks on West Says al-Nusra Chief in TV Interview,” May 28, 2015; URL: https:// www.theguardian.com/world/2015/may/28/syria-not-a-launching-pad-for-attacks-on-west-says-al-nusra-chief-in-tv-interview. [65] Sam Heller, “The Strategic Logic of Hayat Tahrir al-Sham,” Perspectives on Terrorism 11, 6 (2017): pp. 140–53, at p. 141. [66] Jerome Drevon, “Renouncing al-Qaeda and the Prospect for Engagement” (Middle East Institute, 2019); URL: https://www.mei. edu/publications/renouncing-al-qaeda-and-prospects-engagement. [67] Abu Mohammad Al-Jolani, “New Video Message from Jabhat Fatah al-Shām’s Abū Muḥammad al-Jawlānī: ‘Announcing Its Formation’,” Jihadology, July 28, 2016; URL: https://jihadology.net/2016/07/28/new-video-message-from-jabhat-fata%E1%B8%A5- al-shams-abu-mu%E1%B8%A5ammad-al-jawlani-announcing-its-formation/. [68] Charles Lister, “How al-Qa`ida Lost Control of its Syrian Affiliate: The Inside Story,” CTC Sentinel 11, 1 (2018): pp. 1–9, at pp. 2–3. [69] Including most Western terrorism analysts, who generally concluded that the split was largely an exercise in public relations; Daniel Byman, “What’s in a Name? The New Jabhat al-Nusra and the Future of Al Qaeda,”Lawfare , October 24, 2016; URL: https:// www.lawfareblog.com/whats-name-new-jabhat-al-nusra-and-future-al-qaeda. [70] Aymenn Jawad Al-Tamimi, “The Hay’at Tahrir al-Sham-al-Qaeda Dispute: Primary Texts (I),”Jihad Intel, December 6, 2017; URL: https://jihadintel.meforum.org/210/the-hayat-tahrir-al-sham-al-qaeda-dispute-primary.

[71] Thomas Joscelyn, “Al Qaeda and Allies Announce ‘New Entity’ in Syria.”The Long War Journal, January 28, 2017; URL: https:// www.longwarjournal.org/archives/2017/01/al-qaeda-and-allies-announce-new-entity-in-syria.php. [72] Ayman Al-Zawahiri, “Let Us Fight Them As A Solid Structure,”As-Sahab Media, December 2017: https://kyleorton1991.files. wordpress.com/2017/12/ayman-al-zawahiri-2017-11-28-so-let-us-fight-them-as-a-solid-cemented-structure.pdf; He had made similar points in an earlier video communique, Ayman Al-Zawahiri, “Shaam Will Submit to None except Allah,” As-Sahab Media, April 2017; URL: https://jihadology.net/wp-content/uploads/_pda/2017/04/dr-ayman-al-zcca3awacc84hiricc84-22al-shacc84m- will-submit-to-none-except-god22.pdf. [73] Lister, “The Syria Effect.” [74] Abu Abdullah Al-Shami, “Comments Sincerely Advising Abu Mohammed al-Maqdisi,” February 10, 2017; URL: https:// justpaste.it/13ied. [Translation from Lister, How al-Qa`ida Lost Control, p. 6]. [75] Akil Hussein, “Hay’at Tahrir Al-Sham’s Deal With Turkey Further Alienates It From Other Jihadists” Chatham House, the Royal Institute of International Affairs, November 2017; URL: https://syria.chathamhouse.org/research/hayat-tahrir-al-shams-deal-with- turkey-further-alienates-it-from-other-jihadists. In fact, according to local sources, “the Turkish move into Idlib was the result of an intensive negotiation process between HTS and Turkey. The talks had been initiated by HTS, at the request of its leader Jolani, whose delegates had mentioned to Russia during separate face-to-face bilateral negotiations that HTS was interested in a negotiated agreement to prevent a new conflict in Idlib”; Charles Lister, “Turkey’s Idlib Incursion and the HTS Question: Understanding the Long Game in Syria,” War on the Rocks, October 31, 2017: URL: https://warontherocks.com/2017/10/turkeys-idlib-incursion-and- the-hts-question-understanding-the-long-game-in-syria/. [76] E.g. Adnan Hadid, “The Has Fallen,” May 13, 2018; URL:https://www.memri.org/reports/following-hts-decision-grant- turkey-military-presence-idlib-al-qaeda-supporters-accuse-it#_edn4; see also: Cole Bunzel, “Diluting Jihad: Tahrir al-Sham and the Concerns of Abu Muhammad al-Maqdisi,” Jihadica, March 29, 2017; URL: http://www.jihadica.com/diluting-jihad; Bailey Ulbricht, Justifying Relations with an Apostate During a Jihad: A Salafi-Jihadist Group’s Relations with Turkey in Syria (Washington, D.C.: Middle East Institute, 2019); URL: https://www.mei.edu/publications/justifying-relations-apostate-during-jihad-salafi-jihadist- groups-relations-turkey. [77] Abu al-Fatah Al-Farghali, “On Deployment of Turkish Military Observation Points in the Northwest of Syria,” May 2018; URL: http://www.aymennjawad.org/2018/06/hayat-tahrir-al-sham-relationship-with-turkey. [78] Telegram Post by Muhammad Nazzal, October 13, 2017; URL: https://abujamajem.wordpress.com/2017/10/15/tahrir-al-sham- official-on-turkeys-intervention-to-implement-astana-thats-not-the-reality/. [79] Mona Alami, “Hay’at Tahrir al-Sham is Evolving into a ‘Neo-Qaeda’,” Atlantic Council, June 9, 2017; URL: https://www. atlanticcouncil.org/blogs/syriasource/hay-at-tahrir-al-sham-is-evolving-into-a-neo-qaeda. [80] Kyle Orton, “The Best Bad Outcome for Idlib,”Ahval , December 8, 2018; URL: https://ahvalnews.com/syrian-war/best-bad- outcome-idlib.; Lister, “The Syria Effect.”

ISSN 2334-3745 37 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

[81] McCabe, “The Strategic Failures,” p. 69. [82] Anne Stenersen, “Thirty Years After its Foundation – Where is al-Qaida Going?”Perspectives on Terrorism 11, 6 (2017): pp. 5–16, at p. 13. [83] Argyris and Schön, “Organizational Learning,” pp. 25–26. [84] For example, in a long process of pragmatic self-reflection, the Egyptian Gamaa Islamyia transformed from a jihadist terrorist group into a political party. - Paul Kamolnick, “The Egyptian Islamic Group’s Critique of Al-Qaeda’s Interpretation of Jihad,” Perspectives on Terrorism 7, 5 (2013): 93–106; Görzig, “Deradicalization through Double-Loop Learning?.”

ISSN 2334-3745 38 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Brain and Body “Fingerprints” of Existential Anxiety and Their Relevance for the Identification of Potential Terrorists: A Research Note by Linda Wendelberg

Abstract The literature on radicalization documents that the identification of individuals who might take part in terrorist acts is difficult. In the field of terrorism studies, there is a lack of research on how the mind of individuals would present itself in conditions that are supposed to be related to radicalization processes. On the other hand, in the fields of crime prevention and forensic investigations, knowledge about brain processing and behavior is used to a greater degree. The lack of major longitudinal studies which focus on the period before vulnerable individuals become radicalized is noticeable—as are studies covering later stages of radicalization. Such studies would, however, be of vital importance to explain some of the mechanisms behind radicalization processes. By investigating already- radicalized individuals it is no longer possible to separate what was rooted in the radicalization process and what was rooted in prior life characteristics. By experimentally investigating non-radicalized subjects it is, on the other hand, not possible to make the link to heavy radicalization or actual terrorist acts. A new window to explore this link can possibly be found in investigations of Existential Anxiety [EA]. It has been shown that the condition of Existential Anxiety shares similarities with profiles found in some radicalized individuals—but a physical link to terrorist acts or severe radicalization has not yet been made. However, recent findings on EA could hypothetically explain the highly variable profiles found among terrorists. At present, there is a lack of knowledge about how this condition translates into actual behavior, which makes it difficult to use such information for the purpose of prevention. This review summarizes available evidence indicating that EA could be a risk factor in radicalization processes. Keywords: Existential anxiety, behavior, vulnerability, brain, radicalization, profiling, terrorism

Introduction For a long time, the assumption that terrorists are shockingly normal has dominated the field of terrorism studies. This is beginning to change. Yet the study of the etiology of terrorism is still lacking robust indicators for high-quality risk assessments of potential perpetrators. [1][2] It has been credibly asserted that some types of radicalization are precipitated by certain personal experiences. Moskalenko and McCauley describe this in the following way: “The common denominator is that something happened to make the political personal.”[3] Radicalization is defined as a process where individuals or groups undergo a transformation process characterized by increased support for the use of violence and coercion to promote political or social objectives and goals.[4][5] The radicalization process is also characterized by increased support for and/or use of illegal means.[6][7] However, the content and composition of the radicalization process is still unknown and even the definition of terrorism is still debated.[8] Existing findings related to terrorists show that such individuals manifest considerable diversity. These include individuals with and without known vulnerabilities, individuals who are suggested to have a very high level of psychological function along with apparently great prospects for a successful career in their society.[9][10] From media reports we know that even if the police or other parties have received warnings about possible serious radicalization, there seems to be a high degree of difficulty in identifying those who will actually commit violent acts. It is suggested that the reason for this may be that we might be searching for the wrong characteristics and also fail to consider some of the ways people may change.

ISSN 2334-3745 39 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Existential Anxiety Mortality salience, also called death anxiety, is one of the more prevalent theories about Existential Anxiety [EA].[11][12][13][14] EA is defined as apprehension about the ultimate meaning of life and (fear of) death. [15] Within the perspective of the Terror Management Theory (TMT), “the something that happened” could be subconscious reminders of death.[16] TMT proposes that reminders of death trigger a worldview defense to protect individuals against their fear of death.[17] Extreme behavior and/or attitudes could be part of the defense as well as part of an eventual radicalization process.[18] Fear of death is only one type of existential concern and different types of existential concern can be related to different types of psychological states. [19] For example, social exclusion is related to a perception of life as less meaningful.[20] Human beings are social creatures with a need for social inclusion or integration, which is one aspect that is suggested to be an important factor related to radicalization processes.[21] Existential concern can be considered as a universal basic feature of mankind that can be filled with different meanings closely tied to individual differences and collective cultures.[22][23] The TMT argues that EA is the fundament for many types of existential concerns— which is the reason why TMT is often viewed as a biological theory. Figure 1 shows the change process related to existential anxiety: reminders of death subconsciously influence an individual’s brain and contribute to changed behavior as well as the strengthening of already existing values and beliefs. EA might also contribute to the radicalization of already existing values and beliefs. Whether EA is involved in the process leading to the perpetration of a terrorist act is, however, still an open question. The issue which is debated is whether there is a path going from reminders of death to the execution of terrorist acts. This question [the question mark in Figure 1 below] will be discussed in a later section.

Figure 1: Process of Change due to Activation of Death Anxiety [Reminders of death contribute to changed brain processing. This changed brain processing is related to the radicalization of values and beliefs. Change in brain activation patterns could be driven “mechanically” by sensitivity for repetition of stimuli—described below].

The phenomenon of EA can be investigated experimentally. However, it is difficult to measure existential anxiety during real-world events (as opposed to controlled laboratory environments where subjects are experimentally primed with subtle mortality reminders). Nor do we know whether it is possible to measure the priming effect of EA in already-radicalized subjects, which, after all, would not give us information about an individual’s condition before radicalization. However, if we hypothesize that some experiments related to EA might also describe the start of a radicalization process, there exists a great amount of potentially useful knowledge. This holds true despite the fact that there are few studies about how this condition manifests itself in actual behavior. The following short literature review aims to present a few physiological findings that suggest that EA may be able to explain at least parts of radicalization processes. This review is limited to findings related to the Terror Management Theory (TMT). Since this is a short Research Note, the different subjects are not described exhaustively but rather briefly highlighted in terms of their potential relevance to the study of radicalization, extremism and terrorism, inviting interested readers to further explore a probable connection by following the notes.

ISSN 2334-3745 40 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Political Radicalization and Religiosity—Shared Aspects Existing research has shown that EA is related to political radicalization as well as to extreme forms of behavior. [24][25][26][27] However, due to the experimental conditions used in this type of research, a direct link to radicalization to extremism has been difficult to establish.[28] The link between radicalization and deep religiosity has also been questioned. It has been found that religiosity can be, but does not necessarily need to be, a protective factor against EA.[29][30][31][32] The field of terrorism studies and the field of existential anxiety studies may, however, reach some similar findings. Some research findings suggest that religious fundamentalism is related to changes in the brain’s prefrontal region which is responsible for cognitive flexibility and openness.[33] The research literature in the field of EA suggests that change in the form of a brain lesion may not be necessary to develop fundamentalism. Religiosity may protect vulnerable individuals with respect to becoming radicalized.[34] However, some research studies have also found that subjects with strong religious beliefs may be more obsessional.[35][36] EA is related to the strengthening of obsessional symptoms in already-vulnerable subjects.[37] This suggests that religiosity among extremists can be related to obsessional patterns and not necessarily to religiosity [see Figure 2]. Research has shown that religiosity only mitigates EA for people who already have invested much in their religious beliefs. [38] This suggests that religion could hypothetically be replaced with something else. This also suggests that radicalization tends to be based on already-existing beliefs and values (as in the case of ‘re-born believers’) and that a radicalization process is (also) driven by psychological needs (e.g., obsessional, sexual, need for closure) activated by psychological vulnerabilities in combination with external factors. In short, the radicalization process in an individual often tends to be an exacerbation of already-existing values and beliefs. Figure 2: Path for the Development of Fundamentalist Religious Beliefs (EA=existential anxiety, RB=religious beliefs).

ISSN 2334-3745 41 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Brain Regions Neurophysiology deals with physiological observations of the nervous system while neuropsychology combines information about behavior and mind, based on neurological observations. Neurophysiology and neuropsychology contribute to information about brain functioning and are frequently used in safety and security evaluations as well as in psychological and medical evaluations.[39][40][41][42][43][44] For example, functional Magnetic Resonance Imaging (fMRI), which is one of the neurophysiological methods, has contributed to new information about brain functioning in situations of EA. Extremism has been related to increased activity in the left inferior frontal gyrus (IFG) and to heightened activity in the same region as well as in surrounding areas linked to EA.[45][46][47] Overall, EA seems to affect one or more circuits in the brain, which may have far-reaching significance for sensorimotor function, motivation and behavior. Evidence that EA contributes to changed processing in the brain’s insula is well documented. This region is strongly related to sensorimotor function.[48][49] Alteration of sensorimotor function can be observed or measured by neuropsychological and or neurophysiological testing as well as by computer systems related to human- computer interaction.[50][51] The brain regions found to be altered as a result of priming with EA stimuli (e.g., in the form of verbal reminders of a person’s mortality), are related to aggressive and violent behavior.[52][53]

Brain Visual Paths The dorsal and ventral pathways of the human brain are referred to respectively as the thalamic path and the hypothalamic path.[54] Alterations in the dorsal and ventral pathways are related to changes in an individual’s psychological condition and include his or her sexual problems.[55] Older published research data[56] (and new research data to be published by the current author) suggest that the ventral and dorsal visual paths are affected when subjects are primed with a fear of death and might also be related to different types of vulnerability. In mainstream psychology, vulnerability is often related to high neuroticism, psychopathic traits and low self-esteem, while research on EA suggests that there may be also other vulnerability paths.[57] What if vulnerability traits could be changed as part of the radicalization process? It may well be that a high focus on the more common vulnerability factors may reduce the ability to detect that there may also be common traits or common processes in extreme radicalization. On the other hand, it is possible that detection of change can be of greater importance than the identification of vulnerability factors. Repeated testing shows that subjects primed with EA have a higher degree of variability in data even if the self-reported personality profiles in themselves are not different. This suggests that a focal view on the more general vulnerability factors and a high focus on generalizability may not track the diversity. Moreover, behavior and cognition seem to be altered in specific patterns that can be identified. It suggests that cognition, emotion and motor function are all influenced by EA. Such information could be obtained by researchers working with radicalized individuals. For example, the ventral path is related to sexuality (see below).[58] Published research data [59] and new research data to be published by the current author support the thesis that EA influences the ventral path in a more complex way—rather than only in one direction. Decreased activity in the ventral hypothalamic pathway could, for example, indicate hyposexuality while increased activity could indicate hypersexuality.[60] However, brain activation patterns and cognition for EA are documented at a wider scope than behavioral measures. This restricts the possible use of such findings in counterterrorism work, because concrete behavioralmeasures can be more easily directly implemented in computer algorithms or used in fieldwork.

Sexuality and Radicalization Law enforcement agencies (LEA) and academic research have repeatedly suggested that sexuality is part of the complex that has been linked to radicalization and terrorist acts.[61][62] A large number of studies document that EA contributes to a change in sexual behavior. This change is thought to be part of the psychological defense that is activated when an individual is facing reminders of death.[63][64] However, even though anecdotal observations as well as qualitative studies have described that sexuality appears to be related to

ISSN 2334-3745 42 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 radicalization, few, if any, studies have shown how such issues can be measured. Moreover, researchers have questioned the lack of focus on the existential perspective in studies on sexual dysfunction and other sexual problems, including lack of access to a partner.[65] The existential perspective on sexual problems can be viewed as the deeper psychological reason(s) for sexual distress, including etiological psychological conflicts. [66] This perspective goes far beyond the physiological sexual function and addresses some of the deeper layers of the human mind. Sexual problems cover the entire range from total abstinence of sex to hypersexuality. However, existing research suggests that radicalization appears to be related to more restricted attitudes and motivation towards sexual matters, as well as linked to a higher degree of guilt when exposed to sexual stimuli. [67] On the other hand, the literature indicates that the effect of reminders of death on sexual attitudes and behavior can be related to different paths, including hypersexuality, depending on individual characteristics and circumstances related to, for example, civil status.[68][69] This is illustrated in Figure 3, showing two possible paths that both may be part of the radicalization process. The model is based on the presumption that EA contribute to alteration of sexual needs as also documented in a large quantity of studies.[70][71][72] Blocking of possibilities to fulfil biological needs and self-inflicted punishment by restrict fulfilment of own biological needs can be seen as two sides to the same story. In summary the research suggests that EA increases sexual desire but the motivation (pursuing sexual matters) may go in different directions. Figure 3: EA’s Contribution to Increased Sexual Desire [These may develop in different paths. The path leading to suppression and the path leading to frustration may be associated with the risk of developing extremism. (+SD=increased sexual desire, M=motivation). Suppression and/or control is based on findings with respect to the behavioral inhibition system (BIS)—see section on avoidance below].

ISSN 2334-3745 43 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Ventrolateral Prefrontal Cortex (VPC) Connectivity Self-esteem has repeatedly been found to moderate EA, and high levels of self-esteem are related to resilience towards effects that can be evoked by reminders of death.[73][74] Human beings with high self-esteem, compared to individuals with low self-esteem, have been found to develop increased amygdala-Ventrolateral Prefrontal Cortex (VPC) connectivity after priming with EA.[75] Research suggests that the VPC activation is stronger for death-related words for young adults while older people have been found to display an activation pattern in the opposite direction.[76] Changes in the VPC region are related to psychopathy and to religious fundamentalism.[77][78][79]

Avoidance and Respiratory Sinus Arrhythmia (RSA) Existential Anxiety has been shown to be related to the inhibition (avoidance) system (BIS) and to a decrease in Respiratory Sinus Arrhythmia (RSA).[80][81][82] RSA is defined as an increase in heart rate during inhalation, and a diminished heart rate during exhalation (or heart rate variability related to respiration).[83][84] Low RSA is related to internalization and externalizing behavior, which have been suggested to be risk factors for violent acts, including acts of terrorism.[85][86][87] Moreover, it is found that hostile individuals have a reduced parasympathetic activity (lower RSA) compared to less hostile individuals.[88]

The Serotonin Transporter Polymorphism (5-HTTLPR) Existential Anxiety is also related to the serotonin transporter polymorphism (5-HTTLPR) [89] in the human brain. The 5-HTTLPR describes biological genotypes and certain types have been related to psychological vulnerability and aggression.[90][91] The 5-HTTLPR is part of the serotonin deficiency hypothesis, which has been associated with human aggression. For example, there are differences in the 5-HTTLPR genotype related to criminal convictions.[92] It is argued, however, that this hypothesis lacks confirmatory evidence or is at least uncertain due to contradictory findings, unreliable measurements and high levels of complexity.[93]

Novelty and Familiarity EA is related to the avoidance of novelty and to reduced variety seeking.[94] Human reactions towards novel as well as familiar stimuli have been thoroughly tested because such processing contributes to better information about memory processing and motivation.[95][96][97] Preference for novelty or familiarity activates in different ways in the human brain and can be associated with different types of behavior such as, for example, repetitive restricted responses versus search for novelty.[98][99] Individual patterns of activation related to familiarity and novelty can be a potentially important tool in criminal investigations and crime prevention. [100][101]

Findings from the Field of Eye Tracking Data gathered by an individual’s eye tracking can contribute direct information about behavior as well as indirect information about the human brain; such data can, for instance, be used in relation to human-computer interaction.[102][103] Existing findings suggest that individuals who experience EA avoid threatening stimuli and are avoidant in general.[104][105] Priming a person with EA stimuli is found to influence frequency of update (time between eye movements), length of fixations as well as some other eye-tracking measurements linked with intersubjective differences.[106] EA is, as mentioned above, additionally related to changes in ambient and focal processing and with familiarity versus novelty. Current information about eye-tracking measures is drawn from only a limited number of studies (so far, such studies are noticeably scarce). Behavioral indicators gathered by eye tracking can be used to perform observations, including observations related to

ISSN 2334-3745 44 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 human-computer interaction, while information about body states (e.g., RSA, levels of serotonin and brain connectivity) cannot directly be used as robust indicators. Eye tracking is one of many neurophysiology methods with a potential to discover neuropsychological phenomena generally and cognitive processes that affect behavior in particular.[107]

The Missing Link In research achieving simplicity is frequently one of the most difficult tasks. With respect to Existential Anxiety it is well documented that this condition is related to the behavior inhibition system. It is not obvious to associate avoidance with the extreme aggression shown in terrorist acts. However, research has shown that the behavior inhibition system predicts overcontrol.[108] Since the 1960s, overcontrol has been related to more extreme violence.[109] To the best of the author’s knowledge, no studies have investigated overcontrol related to EA. However, the author has by means of an experiment discovered how others interpret behavior based on data from EA (results to be published in a separate paper). A simplified summarization of the main findings of importance as drivers for the radicalization process can be found in Figure 4. This model assumes that Sensitivity for Repetition of Stimuli (SFR) is a driver of the radicalization process. Moreover, it assumes that BIS predicts overcontrol, which is a possible connection to violent terrorist acts.

Main Drivers of the Radicalization Process Existential Anxiety is frequently referred to as a special kind of anxiety. Recent findings about brain activation patterns during EA may, however, contradict any resemblance with common anxiety, especially for high-self- esteem individuals.[110] Research has shown that high neuroticism may be a vulnerability factor, and the EA is assumed to play a significant role in the development and severity of a range of anxiety disorders.[111] [112] Recent research in this direction shows promising results, which may lead to findings that can contribute positively to psychological health, for example with respect to anxiety and obsessions.[113][114] However, we do not know whether this may contribute to a better treatment of radicalization. Moreover, to offer treatment to subjects that may be unaware of their own challenges demands that society is capable to detect how people change. A model of the main drivers of the radicalization process with respect to EA is presented below.

ISSN 2334-3745 45 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Figure 4: Main Drivers in the Radicalization Process and Reason Why EA Can Contribute to the Execution of Acts of Terrorism (L.W.) (BIS=behavior inhibition system, SFR=sensitivity for repetition of stimuli).

However, it is important to continue working on therapeutic solutions for already-radicalized subjects—an area where much work remains to be done.[115]

On Current State of Profiling In the past, the field of profiling has been frequently criticized for producing inaccurate outcomes, e.g., false positives.[116][117] Digital forensics have, however, made advances in recent years and almost replaced the conventional profiling/investigation field due to its potential for higher levels of accuracy.[118][119][120] The paradigm of digital forensics changes our understanding of the type of knowledge that can offer extra value. It has been argued that digital forensics is more about detection than prevention; however, in the field of terrorism, detection is prevention.[121] Profiling is, according to the General Data Protection Regulation (GDPR)

ISSN 2334-3745 46 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Article 22, not allowed without consent from the subject. However, it is permissible when cases fall within the parameters of national security or international criminal law.[122] Information about brain processing and behavior can be used to detect risk factors and to profile individuals or groups, based on new and highly sophisticated technological tools and methods. Today’s profiling focuses to a larger degree on measures that can be transformed and does not, as in the past, focus on static human traits. The field of terrorism studies has, in recent years, documented that individuals may radicalize more quickly than previously assumed.[123] To keep up with this acceleration, we need to link brain research with computing. For this, we need an intermediate variable that can connect the inside of the brain to the outer world.[124] The intermediating variable [the question mark in Figure 5 below] can be behavior but can also be exact measures related to brain activity, personality profiles, or other knowledge that can be transformed for use in the field of computing.

Figure 5: From Brain to Computing

Under normal circumstances, responsible citizens are all obliged to intervene when someone is a danger to themselves or to others. However, with respect to radicalization it is difficult to know when this is should be the case. Changes related to EA are subtle and difficult to detect and often operate at a subconscious level. This raises ethical and legal dilemmas because individuals influenced by EA may themselves not be aware of this influence while those in their environment may have difficulties in detecting relevant but subtle changes. Imaging and artificial intelligence (AI) technology can, to a larger degree than human beings, detect subtle changes but only if consolidated knowledge about behavior and behavioral change already exists. At present, we lack robust indicators for radicalization processes that can be used by human profilers and in technological (AI) systems within existing legal frameworks. At present, indicators do not offer full answers in the field of terrorism detection due to the complexity of pathways to radicalization. However, in domains of uncertainty, neurophysiological and neuropsychological decision support can be important.

Conclusion Findings related to behavior and brain activation in the field of Existential Anxiety may share similarities with findings about terrorists within the field of radicalization studies. This could apply to patterns of brain activation, findings related to the main visual processing paths in the human brain, activation in the brain’s Ventrolateral Prefrontal Cortex (VPC) region, lower Respiratory Sinus Arrhythmia (RSA), avoidance behavior and preference for familiarity. However, even if we now have access to sophisticated brain-scanning technology that can contribute to more accurate profiling, the field currently lacks measurements to build robust indicators and systems. Studies that document measures and observable behavior for diagnosing the condition of EA are still limited in number. The brief overview presented here suggests, however, that the fields of radicalization-, extremism- and terrorism studies could benefit from including knowledge gathered by neurophysiological and neuropsychological methods about EA in efforts to develop better instruments for risk assessments and prevention efforts.

About the Author: Linda Wendelberg is a certified psychologist with a specialization in organizational psychology. In addition, she has taken courses in law and information security. Currently, she is working on a doctoral dissertation on oculomotor behavior under conditions of existential anxiety (a subfield of ocular biometrics).

ISSN 2334-3745 47 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Previously, she worked as a manager for healthcare at St. Olav’s Hospital division of psychiatry, and also dealt with occupational health (Labor Inspection, Norway). Her current research interests include organizational psychology, criminal profiling, political terrorism, cognitive neuropsychology, information security, as well as risk and risk perception. She is currently affiliated with the Norwegian University of Science and Technology (NTNU), Department of Information Security and Communication Technology and with the Inland Norway University of Applied Science, Department of Psychology.

Notes [1] Monahan, J. (2011). The Individual Risk Assessment of Terrorism,Psychology. Public Policy, and Law, University of Virginia School of Law, Public Law and Legal Theory Research Paper Series No. 2011-34, pp. 1–47. SSRN: https://ssrn.com/abstract=1928722. [2] Monahan, J. (2012). “The Individual Risk Assessment of Terrorism,” Psychology, Public Policy, and Law, 18, 2, pp. 167–205. DOI: 10.1037/a0025792. [3] Moskalenko, S. & McCauley, C. (2011). “The Psychology of Lone-Wolf Terrorism,” Counselling Psychology Quarterly, 24, 2, p. 125. DOI: 10.1080/09515070.2011.581835. [4] Crossett, C. & Spitaletta, J. A. (2010). Radicalization: Relevant Psychological and Sociological Concepts. U.S. Army Asymmetric Warfare Group, prepared by The John Hopkins University, Applied Physics Laboratory, pp. 2–3. URL: https://info.publicintelligence. net/USArmy-RadicalizationConcepts.pdf . [5] Maras, M. (2013). Counterterrorism. Jones & Bartlett Learning, pp. 4 and 7. ISBN-13: 978-1449648602. [6] Ibid. 4. [7] Ibid. 5. [8] Schmid, A. P. (2020). “Revisiting the Wicked Problem of Defining Terrorism.” Forthcoming article in: Contemporary Voices: The St Andrews Journal of International Relations. [9] Maras, M., op. cit., p. 4 and 7. [10] Lyall, G. (2017). “Who are the British Jihadists? Identifying Salient Biographical Factors in the Radicalisation Process,” Perspectives on Terrorism, 11, 3, pp. 62–70. ISSN 2334-3745. [11] Pyszczynski, T., Abdollahi, A., Solomon, S., Greenberg, J., Cohen, F., & Weise, D. (2006). “Mortality Salience, Martyrdom, and Military Might: The Great Satan versus the Axis of Evil,” Personality and Social Psychology Bulletin, 32, pp. 525–537. DOI:10.1177/0146167205282157. [12] Hogg, M. A., & Blaylock D. L. (Eds.) (2012). Extremism and the Psychology of Uncertainty. New York: Wiley-Blackwell. [13] Scott, B. G. & Weems, C. F. (2013). “Natural Disaster and Existential Concerns: A Test of Tillich´s Theory of Existential Anxiety,” Journal of Humanistic Psychology, 53, 1, pp. 114–128. DOI: 0.1177/0022167812449190. [14] Weems, C. F., Costa, N. M., Dehon, C. & Berman, S. L. (2004). “Paul Tillich’s Theory of Existential Anxiety: A Preliminary Conceptual and Empirical Examination,” Anxiety, Stress and Coping, 17, 4, pp. 383-99. DOI: 10.1080/10615800412331318616. [15] Ibid. 13. [16] Moskalenko, S. & McCauley, C. p. 125. [17] Ibid. 10. [18] Crossett, C. & Spitaletta, J. A., op. cit., p. 2–3. [19] Ibid. 12. [20] Stillman, T. F., Baumeister R. F., Lambert N. M., Crescioni, A. W., DeWall, C. N. & Fincham, F. D. (2009). “Alone and Without Purpose: Life Loses Meaning Following Social Exclusion,” Journal of Experimental Social Psychology 45, 4, pp. 686–694. DOI: 10.1016/j.jesp.2009.03.007. [21] Lyall, G. op cit., p. 62–70. [22] Ibid. 10.

ISSN 2334-3745 48 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

[23] Ibid. 12. [24] Burke, B. L., Kosloff, S. & Landau, M. J. (2013). “Death Goes to the Polls: A Meta‐Analysis of Mortality Salience Effects on Political Attitudes,” Political Psychology, 34, 2, pp. 183–200. DOI: 10.1111/pops.12005. [25] Burke, B. L., Martens, A. & Faucher, E. H. (2010). “Two Decades of Terror Management Theory: a Meta-analysis of Mortality Salience Research,” Personal and Social Psychology Review, 14, 2, pp. 155–195. DOI: 10.1177/1088868309352321. [26] Cohen, F., Ogilvie, D. M., Solomon, S., Greenberg, J. & Pyszczynski, T. (2005). “American Roulette: The Effect of Reminders of Death on Support for George W. Bush in the 2004 Presidential Election,” Analyses of Social Issues and Public Policy, 5, 1, pp. 177–187. DOI: 10.1111/j.1530-2415.2005.00063.x . [27] Weise, D. R., Arciszewski, T., Verlhiac, J.-F., Pyszczynski, T., & Greenberg, J. (2012). “Terror Management and Attitudes toward Immigrants: Differential Effects of Mortality Salience for Low and High Right-Wing Authoritarians,” European Psychologist, 17, 1, pp. 63–72. DOI: 10.1027/1016-9040/a000056. [28] Vergani, M., O’Brien, K. S., Lentini, P., & Barton, G. (2018). “Does the Awareness of Mortality Shape People’s Openness to Violence and Conflict? An Examination of Terror Management Theory,”Political Psychology, 40, 1, pp. 1–14. DOI: 10.1111/pops.12488. [29] Aly, A., & Striegher, J-L. (2012). “Examining the Role of Religion in Radicalization to Violent Islamists Extremism,” Studies in Conflict & Terrorism, 35, 12, pp. 849–862. DOI: 10.1080/1057610X.2012.720243. [30] Jonas, E. & Fischer, P. (2006). “Terror Management and Religion: Evidence that Intrinsic Religiousness Mitigates Worldview Defense following Mortality Salience,” Journal of Personality and Social Psychology, 91, 3, pp. 553–567. DOI: 10.1037/0022- 3514.91.3.553. [31] Jong, J., Ross, R., Philip, T., Chang, S., Simons, N. & Halberstadt, J. (2017). “The Religious Correlates of Death Anxiety: a Systematic Review and Meta-Analysis,” Religion, Brain & Behavior, pp. 1–17. DOI.org/10.1080/2153599X.2016.1238844. [32] Norenzavan, A., Dar-Nimrod, I., Hansen, I. & Proulx, T. (2009). “Mortality Salience and Religion: Divergent Effects on the Defense of Cultural Worldviews for the Religious and the Non-Religious,” European Journal of Social Psychology, 39, pp. 101–113. DOI: 10.1002/ejsp.482. [33] Zhong, W., Cristofori, I., Bulbulia, J., Krueger, F. & Grafman, J. (2017). “Biological and Cognitive Underpinnings of Religious Fundamentalism,” Neuropsychologia, 100, pp. 18–25. DOI: 10.1016/j.neuropsychologia.2017.04.009. [34] Coid, J. W., Bhui, K., MacManus, D., Kallis, C., Bebbington, P. & Ullrich, S. (2016). “Extremism, Religion and Psychiatric Morbidity in a Population-Based Sample of Young Men,” The British Journal of Psychiatry, 209, 6, pp. 491–497, DOI: 10.1192/bjp. bp.116.186510: 10.1192/bjp.bp.116.186510. [35] Inozu, M., Karanci A. N. & Clark, D. A. (2012). “Why are Religious Individuals more Obsessional? The Role of Mental Control Beliefs and Guilt in Muslims and Christians,” Journal of Behavioral Therapy & Experimental Psychiatry 43. DOI: 10.1016/j. jbtep.2012.02.004. [36] Lewis, C. A. & Kate M. Loewenthal, K. M. (2018). “Religion and Obsessionality: Obsessive Actions and Religious Practices,” Mental Health, Religion & Culture, 21, 2, pp. 117–122. DOI: 10.1080/13674676.2018.1481192. [37] Menzies, R. E. & Dar-Nimrod, I. (2017). “Death Anxiety and Its Relationship with Obsessive-Compulsive Disorder,” Journal of Abnormal Psychology, 126, 4, pp. 367–377. DOI: 10.1037/abn0000263. [38] Jonas, E. & Fischer, P. (2006). “Terror Management and Religion: Evidence That Intrinsic Religiousness Mitigates Worldview Defense Following Mortality Salience,” Journal of Personality and Social Psychology. 91, 3, pp. 553–567, DOI: 10.1037/0022- 3514.91.3.553. [39] Anderson, T. J., Jenkins, I. H., Brooks, D. J., Hawken, M. B., Frackowiak, R. S. & Kennard, C. (1994). “Cortical Control of Saccades and Fixation in Man: A Pet Study,” Brain 117, Pt5, 5, pp. 1073–1084. [40] Dimoka, A., Banker, R. D., Benbasat, I., Davis, F. D., Dennis, A. R., Grefen, D. et al. (2012). “On the Use of Neurophysiological Tools in IS Research: Developing a Research Agenda for Neuro IS,” MIS Quarterly, 36, 3, pp. 679–702. DOI: 10.2139/ssrn.1557826. [41] Anderson, E. J., Husain, M. & Sumner, P. (2008). “Human Intraparietal Sulcus (IPS) and Competition between Exogenous and Endogenous Saccade Plans,” Neuorimage, 40, pp. 838–851. DOI: 10.1016/j.neuroimage.2007.10.046. [42] Marchand, Y., D´Arcy R. C. N. & Connolly J. F. (2002). “Linking Neurophysiological and Neuropsychological Measures for Aphasia Assessment,” Clinical Neurophysiology, 113, pp. 1715–1722. DOI: 10.1016/S1388-2457(02)00224-9. [43] Poletti, B., Carelli, L., Soca, F., Lafronza, A., Pedroli, E., Faini, A. et al. (2017). “An Eye-Tracking Controlled Neuropsychological Battery for Cognitive Assessment in Neurological Diseases,” Neurological Science. 38. 4, pp. 595–603. DOI: 10.1007/s10072-016- 2807-3.

ISSN 2334-3745 49 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

[44] Vance, A. Anderson B. B., Kirwan C. B. & Eargle D. (2014). “Using Measures of Risk Perception to Predict Information Security Behaviour: Insights from Electroencephalography (EEG),” Journal of the Association for Information Systems, 15, pp. 679–722. URL: https://search.proquest.com/docview/1619352586?accountid=4488 [45] Pretus, C., Hamid, N., Sheikh, H., Gingnes, J., Tobeña, Davis, R. et al. (2018). “Neural and Behavioral Correlates of Sacred Values and Vulnerability to Violent Extremism,” Frontiers in Psychology, 9, 2462, pp. 1–12. DOI: 10.3389/fpsyg.2018.02462. [46] Klackl J., Jonas E. & Fritsche I. (2017). “Neural Evidence that the Behavioral Inhibition System is Involved in Existential Threat Processing,” Social Neuroscience, pp. 1–17. DOI: 10.1080/17470919.2017.1308880. [47] Klackl, J., Jonas, E., & Kronbichler, M. (2014). “Existential Neuroscience: Self-esteem Moderates Neuronal Responses to Mortality-Related Stimuli,” Social Cognitive Affective Neuroscience, 9, pp. 1754–1761. DOI: 10.1093/scan/nst167. [48] Avanzini, P., Abdollahi, R. O., Sartori, I., Cauna, F., Pellicia, V. Casaceli, G. et al. (2016). “Four-Dimensional Maps of the Human Somatosensory System,” PNAS, 113, 13, pp. 1936–1943. DOI: 10.1073/pnas.1601889113. [49] Bzdok, D., Schilbach, L., Vogeley, K., Schneider, K., Laird, A. R., Langner, R. et al. (2012). “Parsing the Neural Correlates of Moral Cognition: ALE Meta-Analysis on Morality, Theory of Mind, and Empathy,” Brain Structure Functions, 217, pp. 783–796. DOI: 10.1007/s00429-012-0380-y. [50] Barakova, E. I., Spink, A. S., de Ruyter, B. & Noldus, L. P. J. J. (2013). “Trends in Measuring Human Behavior and Interaction,” Pers Ubiquit Comput., 17, pp. 1–2. DOI: 10.1007/s00779-011-0478-x. [51] Beyrak-Lev, J., Gerber, Z., Ein-Dor, T. & Hirschberger, G. (2018). “Mortality Salience Reduces Tactil Attention among People with Low Body Esteem,” Death Studies, pp. 1–19. DOI: 10.1080/07481187.2017.1363321. [52] Fanning, J. R., Keedy, S., Berman, M. E., Lee, R. & Coccaro, E. F. (2017). “Neural Correlates of Aggressive Behavior in Real Time: a Review of fMRI Studies of Laboratory Reactive Aggression,” Curr Behav Neurosci Rep., 4, 2, pp. 138–150. DOI:10.1007/s40473- 017-0115-8. [53] Tiihonen, J., Rossi, R., Laakso M. P., Hodgins, S., Testa, C., Perez, J. et al. (2008). “Brain Anatomy of Persistent Violent Offenders: More Rather than Less,” Psychiatry Research Neuroimaging, 163, 3, pp. 201–212. DOI:10.1016/j.pscychresns.2007.08.012. [54] Motofei, I. G. & Rowland, D. L. (2013). “The Ventral-Hypothalamic Input Route: a Common Neural Network for Abstract Cognition and Sexuality,” BJU International, 113, pp. 296–303. DOI: 10.1111/bju.12399. [55] Ibid. 53. [56] Wendelberg, L., Volden, F. & Yildirim-Yayilgan, S. (2017). “Death Anxiety and Visual Oculomotor Processing of Arousing Stimuli in a Free View Setting,” Scandinavian Journal of Psychology, 58, 2, pp. 131–141. DOI: 10.1111/sjop.12354. [57] Florian, V., Mikulincer, M. & Hirschberger, G. (2010). “An Existentialist View on Mortality Salience Effects: Personal hardiness, death‐thought accessibility, and cultural worldview defense,” British Journal of Social Psychology, 40, 3, pp. 437–453. DOI: 10.1348/014466601164911. [58] Dugas, M. & Kruglanski, A. W. (2014). “The Quest for Significance Model of Radicalization: Implications for the Management of Terrorist Detainees,” Behav. Sci. Law., 32, pp. 423–439. DOI: 10.1002/bsl.2122. [59] Ibid. 55. [60] Ibid. 53. [61] Landau, M. J., Rothschild, Z. K., & Sullivan, D. (2012). “Fetishism as a Defense against Existential Uncertainty.” In: Hogg M. A. & Blaylock D. L. (Eds.). Extremism and the Psychology of Uncertainty, Extremism in Everyday Life. New York L: Wiley-Blackwell, pp. 131–146. [62] Organization for Security and Co-operation in Europe (OSCE) (2019). Understanding the Role of Gender in Preventing and Countering Violent Extremism and Radicalization That Lead to Terrorism.Organization for Security and Co-operation in Europe (OSCE). ISBN: 978-3-903128-38-5. [63] Burke, B. L., et al., pp. 155–195. [64] Ibid. 60. [65] Watter, D. N. (2018). “Existential Issues in Sexual Medicine: The Relation Between Death Anxiety and Hypersexuality,” Sex Med Rev. 6, 1, pp. 3–10. DOI: 10.1016/j.sxmr.2017.10.004. [66] Ibid. 64. [67] Ibid. 57.

ISSN 2334-3745 50 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

[68] Watter, D. N., op cit., pp. 3–10. [69] Birnbaum, G., Hirschberger, G. & Goldenberg, J. (2011). “Desire in the Face of Death: Terror Management, Attachment, and Sexual Motivation,” Personal Relationship, 18, pp. 1-–19. DOI: 10.1111/j.1475-6811.2010.01298.x. [70] Burke, B. L., et al., p. 155-195. [71] Ibid. 67. [72] Ibid. 68. [73] Routledge, C., Ostafin, B., Juhl J., Sedikides, C., Cathey, C. & Liao, J. (2010). “Adjusting to Death: The Effects of Mortality Salience and Self-Esteem on Psychological Well-Being, Growth Motivation, and Maladaptive Behaviour,” Journal of Personality and Social Psychology, 99, 6, pp. 897–-916. DOI: 10.1037/a0021431. [74] Schmeichel, B. J., Gailliot, M. T., Filardo, E. A., McGregor, I., Gitter, S. & Baumeister, R. F. (2009). “Terror Management Theory and Self-Esteem Revisited: the Roles of Implicit and Explicit Self-Esteem in Mortality Salience Effects,” Journal of Personality and Social Psychology, 96, 5, pp. 1077–1087. DOI: 10.1037/a0015091. [75] Yanagisawa, K., Abe, N., Kashima, E. S., & Nomura, M. (2016). “Self-Esteem Modulates Amygdala-Ventrolateral Prefrontal Cortex Connectivity in Response to Mortality Threats.”Journal of Exp Psychol Gen.,” 145, 3, pp. 273–83. DOI: 10.1037/xge0000121. [76] Hiyoshi, K., Becker, C., Oishi, N., & Fukuyama, H. (2017). “A Review of Effects of Death Anxiety on the Human Brain,” Journal of the Neurological Sciences, p. 381. DOI: 10.1016/j.jns.2017.08.732. [77] Blair, R. J. R. (2008). “The Amygdala and Ventromedial Prefrontal Cortex: Functional Contributions and Dysfunction in Psychopathy,” Phil. Trans. R. Soc. B., 363, pp. 2557–2565. DOI: 10.1098/rstb.2008.0027. [78] Koenigs, M. (2014). “The Role of Prefrontal Cortex in Psychopathy,” Review of Neuroscience, 23, 3, pp. 253–-262. DOI: 10.1515/ revneuro-2012-0036. [79] Zhong, W., et al., pp. 18–25. [80] Agroskin, D., Jonas, E., Klackl, J. & Prentice, M. (2016). “Inhibition Underlies the Effect of High Need for Closure on Cultural Closed-Mindedness under Mortality Salience,” Frontiers in Psychology, 7, 1583, pp. 1–16. DOI: 10.3389/fpsyg.2016.01583. [81] Keltikangas-Järvinen, L., Kettunen, J., Ravaja, N., & Näätänen, P. (1999). “Inhibited and Disinhibited Temperament and Autonomic Stress Reactivity,” International Journal of Psychophysiology, 33, 3, pp. 185–196. DOI: 10.1016/S0167-8760(99)00057-4. [82] Kosloff, S., Allen, J. J. B., & Greenberg, J. (2008). “The Psychophysiology of Terror Management: Mortality Salience Decreases Respiratory Sinus Arrhythmia.” Conference paper in: Forty-eighth annual meeting of the Society for Psychophysiological Research. Austin, Texas, USA, Psychophysiology, 45, 1. DOI: 10.1111/j.1469-8986.2008.00726. x. [83] Ibid, 80. [84] Ibid, 81. [85] Kombo, P. (2017). “Radicalization as a Functional Aspect of Crime,” Mediterranean Journal of Social Sciences, pp. 163–170. DOI: 10.1515/mjss-2017-0053. [86] Crossett, C. & Spitaletta, J. A. (2010). “Radicalization: Relevant Psychological and Sociological Concepts. U.S. Army Asymmetric Warfare Group,” prepared by The John Hopkins University, Applied Physics Laboratory; URL: https://info.publicintelligence.net/ USArmy-RadicalizationConcepts.pdf. [87] Zhang, W., Fagan, S. E. & Gao, Y. (2017). “Respiratory Sinus Arrhythmia Activity Predicts Internalizing and Externalizing Behaviors in Non-Referred Boys,” Frontiers in Psychology, 8, 1496, pp. 1-13. DOI: 10.3389/fpsyg.2017.01496. [88] Demaree, H. A., & Evart, E. D. (2004). “Healthy High-Hostiles: Reduced Parasympathetic Activity and Decreased Sympathovagal Flexibility during Negative Emotional Processing,” Personality and Individual Differences, 36, 2, pp. 457–-469. DOI: 10.1016/S0191- 8869(03)00109-0. [89] Luo, S., Yu, D. & Han, S. (2017). “5-HTTLPR Moderates the Association between Interdependence and Brain Responses to Mortality Threats,”Human Brain Mapping 38, 12, pp. 6157–6171. DOI: 10.1002/hbm.23819. [90] Cherepkova, E. V., Maksimov, V. V. & Aftanas, L. I. (2018). “Polymorphism of Serotonin Transporter Gene in Male Subjects with Antisocial Behavior and MMA Fighters,” Translational Psychiatry, 8, 248, pp. 1–9. DOI: 10.1038/s41398-018-0298-0. [91] Goldman, N., Glei, D. A., Lin, Y. & Weinstein, M. (2010). “The Serotonin Transporter Polymorphism (5-HTTLPR): Allelic Variation and Links with Depressive Symptoms,” Depression Anxiety, 27, 3, pp. 260–269. DOI: 10.1002/da.20660. [92] Toshchakova, V. A., Bakhtiari, Y., Kulikov, A. V., Gusev, S. I., Trofimova M. V., Fedorenko O. Y. et al. (2017). “Association of

ISSN 2334-3745 51 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Polymorphisms of Serotonin Transporter (5HTTLPR) and 5-HT2C Receptor Genes with Criminal Behavior in Russian Criminal Offenders,”Neuropsychobiology , 75, pp. 200–210. DOI: 10.1159/000487484. [93] Duke, A. A., Bègue, L., Bell, R. & Eisenlohr-Moul, T. (2013). “Revisiting the Serotonin-Aggression Relation in Humans: A Meta- Analysis,” Psychology Bulletin, 139, 5, pp. 1148–1172. DOI: 10.1037/a0031544. [94] Huang, Z. & Wyer J., R. S. (2015). “Diverging Effects of Mortality Salience on Variety Seeking: The Different Roles of Death Anxiety and Semantic Concept Activation,” Journal of Experimental Social Psychology, 58, pp. 112–123. DOI: 10.1016/j.jesp.2015.01.008. [95] Bunzeck, N., Doeller, C. F., Dolan, R. J. & Duzel, E. (2012). “Contextual Interaction Between Novelty and Reward Processing Within the Mesolimbic System,” Human Brain Mapping, 33, pp. 1309–1324. DOI: 10.1002/hbm.21288. [96] Daselaar, S. M., Fleck, M. S. & Cabeza, R. (2006). “Triple Dissociation in the Medial Temporal Lobes: Recollection, Familiarity and Novelty,” Journal of Neurophysiology, 96, pp. 1902–1911. DOI: 10.1152/jn.01029.2005. [97] Liao, H., Yeh, S. & Shimojo, S. (2011). “Novelty vs. Familiarity Principles in Preference Decisions: Task-Context of Past Experience,” Frontiers in Psychology, 2, 43, pp. 1–8. DOI: 10.3389/fpsyg.2011.00043. [98] Kim, H. F., Ghaziazadeh, A. & Hikosaka, O. (2014). “Separate Groups of Dopamine Neurons Innervate Caudate Head and Tail Encoding Flexible and Stable Value Memories,” Frontiers in Neuroanatomy, 8, 120, pp. 1–12. DOI: 10.3389/fnana.2014.00120. [99] Moy, S. S., Nadler, J. J., Poe, M. D., Nonneman, R. J., Young, N. B., Koller, B. H. et al. (2008). “Development of a Mouse Test for Repetitive, Restricted Behaviors: Relevance to Autism,” Behavioral Brain Research, 188, 1, pp. 178–194. DOI: 10.1016/j.bbr.2007.10.029. [100] Ibid. 98. [101] Dickson, K. & McMahon, M. (2005). “Will the Law Come Running? The Potential Role of “Brain Fingerprinting” in Crime Investigation and Adjudication in Australia,” Journal of Law Medicine, 13, 2, pp. 204–222. PMID: 16304761. [102] Holmqvist, K., Nyström, M., Andersson, R., Dewhurst, R., Halszka, J., & van de Weijer, J. Eye Tracking: A Comprehensive Guide to Methods and Measures. Oxford: Oxford University Press, 2011. ISBN: 9780199697083. [103] Léger, P., Sénecal, S., Courtemanche, F., Oriz de Guinea, A., Titah, R., Fredette, M. et al. (2014). “Precision in the Eye of the Beholder: Application of Eye Fixation-Related Potentials to Information Systems Research,” Journal of the Association for Information Systems, 15, 10, pp. 651–703. DOI: 10.17705/1jais.00376. [104] Hirschberger, G., Ein-Dor, T., Caspi, A., Arzouan, Y., & Zivotofsky, A. Z. (2010). “Looking Away from Death: Defensive Attention as a Form of Terror Management,” Journal of Experimental Social Psychology, 46, pp. 172–178. DOI: 10.1016/j.esp.2009.10.005. [105] Ibid. 79. [106] Wendelberg, L., et al., pp. 131–141. [107] Marchand, Y., et al., pp. 1715–1722. [108] Knyazev, G. G. & Slobodskaya, H. R. (2006). “Personality Types and Behavioural Activation and Inhibition in Adolescents,” The Journal of Personality and Individual Differences, 41, pp. 1385–95. DOI: 10.1016/j.paid.2005.11.035. [109] Davey, L., Day, A. & Kevin Howells, K. (2005). “Anger, Over-Control and Serious Violent Offending,”Aggression and Violent Behavior, 10, pp. 624–35. DOI: 10.1016/j.avb.2004.12.002. [110] Klackl, J., et al., pp. 1754–1761 [111] Goldenberg, J. L., Hart, J., Pyszczynski, T., Warnica, G. M., Landau, M. & Thomas, L. (2006). “Ambivalence Toward the Body: Death, Neuroticism, and the Flight from Physical Sensation,” Personality and Social Psychology Bulletin, 32, 9, pp. 1264–1277. DOI: 10.1177/0146167206289505. [112] Iverach, L., Menzies, R. G. & Menzies, R. E. (2014). “Death Anxiety and its Role in Psychopathology: Reviewing the Status of a Transdiagnostic Construct,” Clinical Psychology Review, 34, pp. 580–593, DOI: 10.1016/j.cpr.2014.09.002. [113] Träkner, D., Boulet, A., Peden, E., Focht, R., Van Deren, D. & Capecchi, M. (2019). “A Microglia Sublineage Protects from Sex- Linked Anxiety Symptoms and Obsessive Compulsion,” Cell Reports, 29, 4, pp. 1–13, DOI: 10.1016/j.celrep.2019.09.045. [114] Levey, D. F., Gelernter, J., Polimanti, R., Zhou, H., Cheng, Z., Aslan, M. et al. (2020). “Reproducible Genetic Risk Loci for Anxiety: Results From ∼200,000 Participants in the Million Veteran Program,” American Journal of Psychiatry, ajp in Advance, pp. 1–10. DOI: 10.1176/appi.ajp.2019.19030256. [115] Koller, S., Christensen, A. B., Corduan, G., Duits, N., Freund, A. M., Paul, Gill et al. (2019). Issue Paper: Psychological Factors and Mental Health Issues in Tertiary Prevention. InFoEx Workshop, Berlin, May 23–24, German Council on Foreign Relations. [116] Alison, L., Goodwill, A., Almond, L., van den Heuvel, C. & Winter, J. (2010). “Pragmatic Solutions to Offender Profiling and

ISSN 2334-3745 52 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Behavioural Investigative Advice,” Legal and Criminological Psychology, 15, pp. 115–132. DOI: 10.1348/135532509X463347. [117] Dzhekova, R., Mancheva, M., Stoynova, N. & Anagnostou, D. (2017). “Monitoring Radicalization, A Framework for Risk Indicators.” In Shentov, O., Todorov, B. & Stoyanov, A. (Eds.), Reports Center for the Study of Democracy. ISBN: 978-954-477-302-1. [118] Youyou, W., Kosinski, M. & Stillwell, D. (2015). “Computer-Based Personality Judgments are More Accurate Than Those Made by Humans,” PNAS, 112, 4, pp. 1036-1040. DOI: 10.1073/pnas.1418680112. [119] Kanter, J. M. & Veeramachaneni, K. (2015). Deep Feature Synthesis: Towards Automating Data Science Endeavors. 2015 IEEE International Conference on Data Science and Advanced Analytics (DSAA), Paris, France, pp. 1–10. DOI; 10.1109/DSAA.2015.7344858. [120] Nagi, R., Aravinda, K., Rakesh, N., Jain, S., Kaur, N. & Mann, A. K. (2019). “Digitization in Forensic Odontology: A Paradigm shift in Forensic Investigations,”Journal of Forensic Dental Science 11, 1, pp. 5–10, DOI: 10.4103/jfo.jfds_55_19: 10.4103/jfo.jfds_55_19. [121] Irons, A. (2010). “Digital Forensics and Measurement Science,” Digital Forensic and Measurement Science, 43, 8, pp. 238–242. DOI: 10.1177/002029401004300803. [122] URL: https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&from=EN#d1e2793-1-1 . [123] Schmid, A. P. (2013). Radicalisation, De-Radicalisation, Counter-Radicalisation: A Conceptual Discussion and Literature Review. The Hague:The International Centre for Counter-Terrorism– The Hague (ICCT), 4, no. 2, pp. 3–97. [124] Prithvi Iyer, P. (2020). “The Myth of ‘Pure Evil’: Using Behavioural Science to Help Understand and Counter Terrorism,”ORF Issue Brief, 333, pp. 1–16, Observer Research Foundation.

ISSN 2334-3745 53 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

A New Inventory of 30 Terrorism Databases and Data Sets by Neil G. Bowie

Abstract This Research Note is a follow-up from two previously published Research Notes by the author in this journal titled: ‘Terrorism Events Data: An Inventory of Databases and Data Sets, 1968–2017’ [URL: http://www.terrorismanalysts. com/pt/index.php/pot/article/view/622/1226 ] and ‘30 Terrorism Databases and Data Sets: A New Inventory’ [URL: http://universiteitleiden.nl/binaries/content/assets/customsites/perspectives-on-terrorism/2018/issue-5/ bowie.pdf ]. Together, the previous inventories covered 90 databases and data sets. This Research Note describes 30 more databases and data sets in the same three categories: i. Academic, Think Tank and Independent Databases (n=19) ii. Commercial Databases (n=3) and iii. Governmental Databases (n=8). Most of these data refer to terrorism, yet a few are broader, covering other forms of political violence as well as armed conflicts. Keywords: terrorism, counter-terrorism, databases, data sets, chronologies, political violence, armed conflict

Introduction This inventory of mainly open source databases and data sets on terrorism, adds to an ever-increasing body of terrorism data now accessible to both the academic research community and other interested parties. North America and Europe still dominate the institutions hosting openly accessible databases and data sets on terrorism, political violence and related armed conflict. The costs involved in establishing databases on terrorism, maintaining them and the commitment to future running operations can be daunting. Universities, think tanks and committed scholars have often given generously of money, time and commitment to projects that by their nature can potentially be open-ended. However, even well-funded Government projects such as the U.S. National Counter Terrorism Centre’s WITS database (World-Wide Incidents Tracking System) and the MIPT Knowledge Base were eventually disbanded. A mixture of funding issues and political decisions affected their fate. In addition, data credibility, potential pressure from database funders and controversial issues of under- and over-reporting of terrorism incidents add to complex challenges.[1] Finances and politics are never far away from any publicly funded terrorism database project. Despite these many challenges, the terrorism databases and data sets presented in the inventory below illustrate the breadth and diversity of quantitative data available to researchers. These include, for example, traditional chronologies on terrorism (items 3 and 12), databases on terrorism and violent extremism on the continent of Africa (item 1), and niche data sets on how terrorism ends (item 9). The newly established Eurojust cross- judicial terrorism database in Europe (item 28) and future database projects including violent deaths worldwide (item 8) and a domestic security and counter-terrorism database in the state of Florida (item 25), indicate the universe of data is increasing. Commercial organisations also make their contribution to terrorism data and analysis. Specialist areas such as the terrorism (re-) insurance market (item 22), risk consultancy services (item 20) and terrorism facial recognition databases (item 21) have all added to the expanding selection of terrorism databases and data sets. The common denominator between many of these diverse databases and data sets is the use of web-based

ISSN 2334-3745 54 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 technologies to source, manage and provide access to a wider audience. As the diversity of data grows larger, there is a risk of creating a silo or ‘stove-pipe’ corpus of terrorism data. Cross-integration of some terrorism data sets may be possible. However, complex factors are involved, including: data analysis and design, institutional agreement, technology, interoperability, definitional criteria, and meaningful cross-linkage.[2] This inventory is not a definitive list of data sets and databases on terrorism. Additional terrorism databases and data sets will be listed in a future Research Note in this journal by the same compiler. While many of the data sets and databases are accessible, some require registration, access permission or, given the sensitive nature of the data, are not directly accessible to the general public or researchers. All website hyperlinks have been validated as of 31 January 2020.

(i) Academic, Think Tank and Independent Databases 1. ACSRT Database on Terrorism and Africa Terrorism Bulletin (ATB) Host Institution: African Centre for the Study and Research on Terrorism (ACSRT), Algiers, Algeria. Scope: Trends on Terrorism on the Continent of Africa. Access: Free. Website: https://caert.org.dz E-Mail: [email protected] Summary: The African Terrorism Bulletin (ATB) is a fortnightly publication providing an assessment of terrorism and violent extremism on the African continent. The Bulletin’s data is sourced from the African Centre for the Study and Research on Terrorism (ACSRT) Database on Terrorism. It provides data, statistics and analysis on terrorist groups, terrorist activities and terrorist leadership and membership within Africa. The African Terrorism Bulletin is principally produced to provide data and analysis to African Union (AU) member states. Data for the African Terrorism Bulletin (ATB) is sourced from the ACSRT’s Database. The database is not publicly accessible.

2. Bias Incidents and Actors Study (BIAS) Host Institution: National Consortium for the Study of Terrorism and Responses to Terrorism (START), University of Maryland (MD), United States. Scope: U.S. violent and non-violent crime 1990–2018. Access: Contact START. Website: https://www.start.umd.edu/search/content/Bias E-Mail: [email protected] Summary: The Bias Incidents and Actors Study data set (BIAS) is a quantitative dataset on US-based individuals who have committed violent and non-violent crime between 1990 and 2018. The BIAS data set is a cross- sectional de-identified dataset. Criteria for entry is that individuals have been ‘at least partially motivated by some form of identity-based prejudice’. These biases can include race, ethnicity, religion, sexual orientation and age, among others.

ISSN 2334-3745 55 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

3. Chronologies of Modern Terrorism Host Institution: [Book Publication] Barry Rubin and Judith Colp Rubin, Chronologies of Modern Terrorism. Routledge, New York, (2015). Scope: Origin and developments in terrorism from the French Revolution until the modern day, with accompanying chronologies. Access: N/A. Website: https://www.routledge.com/Chronologies-of Modern-Terrorism/Rubin-Rubin/p/ book/9780765620477 E-Mail: N/A. Summary: The Chronologies of Modern Terrorism covers major developments and incidents of terrorism from the French Revolution until the present day. Core topics include a , ideology and counter terrorist policy. Regional coverage of Europe, North America, Latin America, Asia, Africa and the Middle East with accompanying chronologies of terrorism incidents and groups are included.

4. CNS Global Incidents and Trafficking Database Host Institution: Nuclear Threat Initiative (NTI), Washington D.C. United States / James Martin Center for Nonproliferation Studies (CNS) Monterey, (CA) United States. Scope: Global incidents of nuclear and radioactive material lost, stolen or outside regulatory control. Access: Free. Website: https://www.nti.org/analysis/articles/cns-global-incidents-and-trafficking-database/ E-Mail: [email protected] Summary: The CNS Global Incidents and Trafficking Database is an open-access database recording incidents of nuclear material (including other types of radioactive material that has been lost or stolen). This also includes nuclear/radioactive material that is not, but should be covered by regulatory control. To date, the database holds 1,156 incidents (2015–2019). An interactive searchable map permits researchers to find all nuclear/radioactive theft/loss incidents from 2013–2018. Source data for the database comes from official regulatory agencies and media reports. The annual report for the database is prepared by the James Martin Center for Nonproliferation Studies (CNS) Monterey, (CA) United States.

5. Customary IHL Database Host Institution: International Committee of the Red Cross, Geneva, Switzerland. Scope: International Humanitarian Law. Access: Free. Website: https://ihl-databases.icrc.org/applic/ihl/ihl-search.nsf/home.xsp E-Mail: https://www.icrc.org/en/contact Summary: The Customary IHL (International Humanitarian Law) Database holds the rules of customary IHL outlined in the International Committee of the Red Cross’s study on Customary IHL (Cambridge University Press: 2005). There are 161 rules. Although not a dedicated database on terrorism, the Customary IHL Database contains references to terrorism in the wider context of International Humanitarian Law. See also the Treaties, ISSN 2334-3745 56 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

States Parties and Commentaries Database and the ICRC National Implementation Database.

6. Explosive Violence Monitoring Project [Database] Host Institution: Action on Armed Violence (AOAV), London, . Scope: Impact of explosive weapons. Access: Free. Website: https://aoav.org.uk E-Mail: See website. Summary: The Explosive Violence Monitoring Project database provides researchers with data on explosive device incidents, including terrorism and other forms of conflict and low-intensity conflict. The project is hosted by Action on Armed Violence (AOAV), an independently funded research organisation. The database search criteria permit differentiation between deaths and injuries as well as civilian and armed actors. Perpetrators within the database include state and non-state actors. Explosive violence perpetrators within the database include for example, terrorist groups, militia, criminal gangs, internal security forces and specific countries.

7. Foreign Fighters Tab of the International Crimes Database (ICD) Host Institution: T.M.C. Asser Instituut, The Hague, Netherlands. Scope: Foreign Fighters Case Law. Access: Free. Website: http://www.internationalcrimesdatabase.org/ForeignFighters E-Mail: [email protected] Summary: The Foreign Fighters Tab deals exclusively with foreign fighter case law. Specifically, it ‘...collect[s] cases of (individuals related to) (potential) foreign fighters, who could be defined as “individuals, driven mainly by ideology, religion and/or kinship, who leave their country of origin or their country of habitual residence to join a party engaged in an armed conflict.”[3] Each Foreign Fighters Tab presents a detailed outline of foreign fighter case law event[s]. Details include procedural history, relevant legal facts, courts holdings and analysis, instruments cited and related cases. The Foreign Fighters Tab is sponsored by the International Centre for Counter-Terrorism – The Hague (ICCT) and the Dutch Ministry of Security and Justice. It is hosted and maintained by the T.M.C. Asser Instituut, The Hague, The Netherlands.

8. Global Registry of Violent Deaths (GReVD) [Forthcoming] Host Institution: Stockholm International Peace Research Institute (SIPRI), Stockholm, Sweden. Scope: Annual number of violent deaths worldwide. Access: N/A. Website: https://www.sipri.org/news/2019/new-initiative-measuring-violent-deaths-worldwide E-Mail: https://www.sipri.org/about/contact Summary: The forthcoming Global Registry of Violent Deaths (GReVD) will be a database of all violent deaths. It will be possible to query data on violent deaths based on global, national, regional levels and will drill down ISSN 2334-3745 57 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 to provincial city and municipality level. Key variables will include: location, time, victim, perpetrator and the type of violence. The GReVD source data will be derived from verifiable news and media reports.

9. How Terrorism Ends Host Institution: [Book publication and data set] Audrey Kurth Cronin, How Terrorism Ends: Understanding the Decline and Demise of Terrorist Campaigns. Princeton University Press: New Jersey (NJ), United States. (2009). Scope: Data sets on terrorist groups that have ended their use of violence. Access: Book publication (requires purchase) with free access to associated website and data sets (see below). Website: https://www.howterrorismends.com/data E-Mail: [email protected] Summary: The data sets to support the book publication ‘How Terrorism Ends: Understanding the Decline and Demise of Terrorist Campaigns’ provide 457 instances of terrorism groups that have ended, based on the author’s definition of what constitutes a terrorist organisation. The data sets are available in .html format, STATA file, and .XLS format (MS Excel), and come with an accompanying codebook (MS Word). The data used to generate the data sets were sourced from the MIPT Terrorism Knowledge Base (TKB) hosted by the National Memorial Institute for the Prevention of Terrorism in Oklahoma City, United States. The MIPT Knowledge Base was disbanded and ceased operating in March 2008.

10. PICSS Database of Anti-State Violence Host Institution: Pakistan Institute for Conflict and Security Studies (PICSS), Islamabad, Pakistan. Scope: Anti-state violence Pakistan. Access: Partly free, partly access on request. Website: https://www.picss.net/picss-database-of-anti-state-violence-in-pakistan E-Mail: [email protected] Summary: The PICSS Database of Anti-State Violence is a chronological database which includes incidents of suicide attacks, IED blasts, terrorism incidents and militant attacks, among others, in Pakistan. Data sets freely available from the database include terror trends within Pakistan, militant attacks, drone attacks and suicide attacks. The PICSS Database focuses mainly on violent militant attacks and the security forces’ response actions. The PICSS database provides data for thePakistan Annual Security Assessment.

11. RTV Dataset Host Institution: Center for Research on Extremism (C-REX), Faculty of Social Sciences, University of Oslo, Norway. Scope: Right-wing terrorism and violence events data in Western Europe (1990–2018). Access: Full data set – on application. Limited data set version free to download from website. Website: https://www.sv.uio.no/c-rex/english/topics/online-resources/rtv-dataset/ E-Mail: [email protected]

ISSN 2334-3745 58 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Summary: The RTV dataset contains acts of right-wing terrorism and violence within Western Europe, covering the period 1990–2018. A total of 757 events are recorded. The data set includes only the most severe types of right-wing terrorism and violence. Specifically, this includes ‘attacks with a deadly or near-deadly outcome’, ‘attacks involving the active use of deadly weapons’ and ‘extensive plots and preparations for armed struggle’.[4]

12. Security Council Report – Chronology of Events (Afghanistan) Host Institution: Security Council Report, New York (NY), United States. Scope: UN Security Council press statements, briefings, resolutions, meetings and debates on Afghanistan 1953–2019. Access: Free. Website: https://www.securitycouncilreport.org/chronology/afghanistan.php E-Mail: [email protected] Summary: The Chronology of Events (Afghanistan) is produced by the Security Council Report, an independent organisation based in New York City, United States. The Chronology logs United Nation’s Security Council issues relating to Afghanistan from 1953–2019. While covering the ongoing conflicts and wars within Afghanistan, the Chronology lists terrorist events in Afghanistan and consequent actions undertaken by the Security Council. These include press statements condemning terrorist attacks by the Taliban, such as suicide bombings and terrorist attacks. The Chronology of Events (Afghanistan) also provides links to Security Council briefings, UN Resolutions, meetings and debates relating to terrorist activity within Afghanistan.

13. Sources of Blame Attribution: Citizen Attitudes Towards Public Officials after 9/11 [Data Set] Host Institution: National Consortium for the Study of Terrorism and Responses to Terrorism (START), University of Maryland (MD), United States. Scope: Study to evaluate citizen attitudes towards U.S. public officials post 9/11. Access: Free. Website: https://www.start.umd.edu/data-tools/sources-blame-attribution-citizen-attitudes-towards-public- officials-after-911 E-Mail: [email protected] Summary: With the use of an Internet-based survey, this study and accompanying data set looks at U.S. citizen attitudes and blame towards three United States intelligence officials and their responsibility in relation to the terrorism events of 11 September 2001.

14. The Global CVE Data set Host Institution: Caitin Ambrozik, United States. [Data set author] Scope: Data set of Countering Violent Extremism (CVE) efforts in 84 countries. Access: Free. Website: https://caitlinambrozik.com/database/

ISSN 2334-3745 59 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

E-Mail: [email protected] Summary: The Global Countering Violent Extremism (CVE) Data set[5] records CVE efforts and practices over a period of seven years (2010–2017), in 84 countries. Data to construct the data set is sourced from the U.S. State Department Country Reports on Terrorism. The Global CVE Data set uses eight indictors, including CVE National Strategy, CVE Programming and Government Participation, among others. An interactive CVE story map permits users to access city-level CVE programme information.

15. The International Crimes Database (ICD) Host Institution: T.M.C. Asser Instituut, The Hague, The Netherlands. Scope: International crimes adjudicated by national, international and internationalized courts. Access: Free. Website: http://www.internationalcrimesdatabase.org/Home E-Mail: [email protected] Summary: The International Crimes Database (ICD) contains records on International Crimes determined by national, international and internationalized courts. Whereas the Foreign Fighters Tab (see above) focuses exclusively on foreign fighter case law, the International Crimes Database covers a broader range of international crimes such as , war crimes, , piracy and terrorism.

16. xSub Host Institution: [Journal publication and data-set] See: Zhukov, Yuri M., Christian Davenport, and Nadiya Kostyuk. 2019. “xSub: A New Portal for Cross-National Data on sub-national Violence.” Journal of Peace Research (forthcoming). Scope: Cross-national data on sub-national violence (1969–2017). Access: Free. Website: http://cross-sub.org E-Mail: [email protected] Summary: The xSub repository is a ‘database of databases’. It is focussed on micro-level sub-national violence event data on armed conflict and contention worldwide. A small amount of references also relates to terrorism. The repository is generated from 21 data sources covering substantial data collections, but also data provided by individual scholars from 156 countries. The xSub project is supported by the Center for Political Studies and Department of Political Science at the University of Michigan, United States.

17. Terrorism – Our World in Data Host Institution: Our World in Data, University of Oxford, Oxford, United Kingdom. Scope: Broad range of quantitative data on terrorism worldwide. Access: Free. Website: https://ourworldindata.org/terrorism E-Mail: [email protected] ISSN 2334-3745 60 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Summary: ‘Terrorism – Our World in Data’ is an online publication produced at the University of Oxford. It forms part of a wider range of social, economic, political, environmental and scientific issues covered by this website. The Terrorism section provides a series of narrative, graphical and quantitative data derived from various sources, including, among others, the Global Terrorism Database (GTD), Aviation Security Network (ASN), Gallup Polls and Gallup Analytics and the World Values Survey.

18. 1993 Terrorism and Political Violence Data set Host Institution: [Publication and data set] Acosta, Benjamin and Kristen Ramos, “Introducing the 1993 Terrorism and Political Violence Dataset.” Studies in Conflict and Terrorism, 40 (3), 232–247. Scope: Universe of terrorism events data 1993. Access: Free. Website: http://www.1993terrorismdata.org E-Mail: [email protected] Summary: The Global Terrorism Database (GTD), was developed and hosted by START—The National Consortium for the Study of Terrorism and Reponses to Terrorism at the University of Maryland, United States. Covering the period 1970–2014, the GTD digitised previously held terrorism event data sources that were either manually held or part computerised. Despite strenuous search efforts, source data previously held for the year 1993 was never found and consequently never included in the Global Terrorism Database (GTD). The 1993 Terrorism and Political Violence Dataset developed by Acosta and Ramos, seeks to fill the void created by the loss of a year’s worth of data sources. The data set contains 4,206 unique terror attack incidents. The data set is available in both .XLS (MS Excel) and .PDF format.

19. Terrorism Threat Assessment 2018–2019 [Publication - Liesbeth van der Heide & Reinier Bergema] Host Institution: International Centre for Counter-Terrorism (ICCT), The Hague, The Netherlands. Scope: Baseline Terrorism Threat Assessment 2018–2019. Access: Free. Website: https://icct.nl/wp-content/uploads/2019/12/ICCT_Terrorism_Threat_Assessment.pdf E-Mail: [email protected] Summary: The Terrorism Threat Assessment 2018–2019 is a situational report providing both quantitative data and qualitative analysis. The report covers 32 countries and uses open-source data from a range of publicly accessible data sets and databases. These include, among others, the Global Terrorism Database (GTD), EUROPOL’S TE-SAT, Government statistics and media sources. The authors categorise their assessment of terrorism into four categories: Terrorist Attacks, (Returning) Foreign Terrorist Fighters (RFTF), Prison & Prosecution and Terrorism Threat Assessments.

ISSN 2334-3745 61 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

(ii) Commercial Databases 20. CORE Political Violence and Violent Organised Crime Report Host Institution: Control Risks, London, United Kingdom. Scope: Global incidents of war, terrorism, unrest and violent organised crime, with commercial relevance. Access: Free. [Requires web-based form completion.] Website: https://www.controlrisks.com/our-thinking/insights/reports/core-incident-report-q1-2019 E-Mail: https://www.controlrisks.com/contact-us Summary: The CORE Political Violence and Violent Organised Crime Report is a new quarterly report produced by the specialist risk consultancy service Control Risks, London. The CORE Report provides data of commercial interest and relevance related to significant political violence incidents, terrorism, war and violent organised crime. A mixture of narrative commentary and graphical incident mapping data is presented. These cover, for example, number of incidents by category, regional and target distribution and tactics employed.

21. IntelCenter Identity Terrorist Facial Recognition (TFR) Host Institution: IntelCenter, Alexandria, Virginia (VA), United States. Scope: Terrorist Facial Recognition. Access: Restricted subscription service. Website: https://intelcenter.com/identity/index.html E-Mail: [email protected] Summary: The IntelCenter’s Terrorist Facial Recognition (TFR) service is a commercially operating enterprise. Its services are restricted to government clients within the military, law enforcement and intelligence services. The TFR facial identity database holds in excess of 830,000 facial recognition entries.

22. Terrorism Frequency Report Host Institution: POOL RE (Pool Reinsurance Company Limited) London, United Kingdom. Scope: Significant acts of terrorism relevant to the terrorism (re-) insurance market. Access: Free. Website: https://www.poolre.co.uk/wp-content/uploads/2019/09/Terrorism-Frequency-Report-March-2019. pdf E-Mail: [email protected] Summary: The Terrorism Frequency Report is a quarterly report presenting significant acts of terrorism relevant to the terrorism (re-) insurance market. Important terrorism trends and themes are identified in the reports. POOL RE also operates the TRAC (Terrorism Risk and Analysis Centre) Database. The TRAC Database provides data for the Terrorism Frequency Reports, in addition to the use of subject specialists and open-source material.

ISSN 2334-3745 62 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

(iii) Governmental Databases 23. Anti-Money Laundering International Database (AMLID) Host Institution: United Nations Office on Drugs and Crime, Vienna, Austria. Scope: Anti-money laundering and financing of terrorism laws and regulations. Access: Free/Restricted. Website: https://www.unodc.org/unodc/en/money-laundering/imolin-amlid.html?ref=menuside E-Mail: [email protected] Summary: The Anti-Money Laundering International Database (AMLID), was established by the International Money Laundering Information Network (IMoLIN), under the auspices of the United Nations in 1998. AMLID is essentially a ‘compendium of analysis of anti-money laundering laws and regulations’. Closely linked to anti- money laundering, the database also covers texts and materials related to terrorist financing and countering the financing of terrorism (CFT). Part of the database is freely accessible, providing terrorism-related legislation and regulations. The database is supported by a partnership of 11 governmental, non-governmental and anti- money laundering organisations.

24. Database and Assessment of Risks of Violent Extremists (DARE) project Host Institution: Netherlands Institute for Forensic Psychiatry and Psychology (NIFP)—project lead. Scope: The analysis of judicial data relating to terrorists and terrorist acts. Access: Restricted. Website: https://www.vera-2r.nl/research-and-development/dare/index.aspx E-Mail: https://www.vera-2r.nl/contact/ Summary: The Database and Assessment of Risks of Violent Extremists (DARE) is a risk assessment database designed to train and support European judiciary in the use of VERA-2R, a risk assessment instrument. The DARE database uses a mixture of personal, psychosocial and contextual information underpinned by available judicial data on terrorists and the acts they commit. VERA-2R assesses risks related to terrorism and extremism. Used by six member states, professionals within their respective criminal justice systems apply VERA-2R to differing judicial contexts. As a risk tool member states are able to share relevant risk information. The DARE database was funded by the European Commission and continues in part to be funded by the Dutch Ministry for Justice and Security as well as other partners.

25. Florida Domestic Security and Counter-Terrorism Database [Forthcoming] Host Institution: The Florida Domestic Security and Counter-Terrorism Intelligence Center, Florida (FL), United States. Scope: Active criminal intelligence and criminal investigative information related to terrorism within the State of Florida, United States. Access: Restricted. Website: http://www.leg.state.fl.us/statutes/index.cfm?App_mode=Display_Statute&Search_ String=&URL=0900-0999/0943/Sections/0943.0321.html

ISSN 2334-3745 63 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

E-Mail: N/A. Summary: The forthcoming Florida Domestic Security and Counter-Terrorism Database, established under 2019 State of Florida statutes, will be hosted and developed by The Florida Domestic Security and Counter- Terrorism Intelligence Center. The Intelligence Center will collect terrorism-related information, criminal intelligence and investigative information. This will be used to populate the Florida Domestic Security and Counter-Terrorism Database. Other federal, state and local law enforcement agencies will feed into and draw from the database. Key variables include: individuals/group plots, plans and coordination of terrorism acts. The database will be providing information on trends, patterns and correlations for both potential and actual terrorist activity that impacts upon, or affects, the State of Florida.

26. IMoLIN Case Law Database Host Institution: International Money Laundering Information Network (IMoLIN), United Nations Office on Drugs and Crime, Vienna, Austria. Scope: International Money Laundering Case Law. Access: Free. Website: https://www.imolin.org/imolin/cld/search.jspx E-Mail: https://www.imolin.org/imolin/contact_form.html Summary: The IMoLIN Case Law Database has been developed by the International Money Laundering Information Network. The IMoLIN Case Law Database contains some case law entries directly related to money laundering and terrorist financing.

27. NATO 9/11 – Chronology of Events Host Institution: North Atlantic Treaty Organisation (NATO), Brussels, Belgium. Scope: NATO press releases, press conferences, statement updates 11 September 2001–11 September 2011. Access: Free. Website: https://www.nato.int/cps/en/natolive/events_77648.htm E-Mail: N/A. Summary: The NATO 9/11 Chronology of Events presents a series of NATO responses to the terrorism events of 11 September 2001. The responses cover the period 2001 to the tenth anniversary of 9/11. The Chronology includes a mixture of statements, NATO updates, press conferences, audio recordings and photographs. The Chronology is available in English and French with select documents also available in German, Russian and Ukrainian.

28. The Counter-Terrorism Register (CTR) Host Institution: Eurojust, The Hague, The Netherlands. Scope: EU-wide database for judicial information on all types of terrorist attacks. Access: Restricted. Website: http://www.eurojust.europa.eu/press/PressReleases/Pages/2019/2019-09-05.aspx

ISSN 2334-3745 64 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

E-Mail: [email protected] Summary: The Counter-Terrorism Register (CTR) is a centralised database developed by the European Union’s Agency for Criminal Justice Cooperation Eurojust, which focuses exclusively on judicial proceedings linked to terrorism. The CTR is able to establish links in proceedings against terrorist suspects across the European Union. In particular, the CTR is designed to allow the sharing of information on current terrorist investigations. It alerts authorities to prosecutions of individuals or terrorist groups and networks and acts as a centralised system registering terrorist convictions on an EU-wide basis.

29. The European Database of Terrorists Host Institution: NIFP Custodial Institutions Agency of the Dutch Ministry of Justice, IKG Institute, University of Bielefeld, Germany and the Penitentiary Services of the Belgium Ministry of Justice. Scope: The database maps factors related to engagement in terrorist activities. Access: Restricted. Website: https://www.vera-2r.nl/news/factsheet-european-database-terrorists.aspx E-Mail: [email protected] Summary: The European Database of Terrorism specifically ‘map[s] factors related to engagement in terrorist activities’. The database is a derivative of the EU-funded DARE project (see: The Database and Assessment of Risks of violent Extremists (DARE) above). The European Database of Terrorism is sourced from judicial documents from European trials of terrorists who have been convicted. The judicial documents consist of a mixture of personal and contextual information and information about specific terrorist act[s], all adhering to strict privacy requirements. Covering six European countries and 16 domains, the European Database of Terrorists contains a control group of non-terrorist violent offenders. This allows researchers to test the factors that relate to engaging in terrorist acts compared with non-terrorist criminal activity. EU funding for the European Database of Terrorists ended in October 2019. The project is currently seeking funding.

30. Victims of Overseas Terrorism Compensation Scheme Cases Resolved (CICA) Host Institution: Criminal Injuries Compensation Authority, , United Kingdom. Scope: United Kingdom victims of terrorism compensation scheme data. Access: Data not released—may require Freedom of Information (FOI) request. Website: https://data.gov.uk/dataset/7cf413d8-f911-4477-bbcd-4cab57ac6523/victims-of-overseas-terrorism- compensation-scheme-cases-resolved-cica E-Mail: N/A. Summary: The data set ‘Victims of Overseas Terrorism Compensation Scheme Cases Resolved (CICA)’ is produced by the United Kingdom’s Criminal Injuries Compensation Authority. The data set provides information relating to the outcome compensation applications for victims affected by an incident of terrorism overseas.

About the Compiler: Neil G. Bowie is an independent scholar, specialising in the analysis of terrorism and counterterrorism. He holds a Ph.D. from the Centre for the Study of Terrorism and Political Violence (CSTPV) at the University of St. Andrews, Scotland. Neil Bowie also holds degrees from the universities of Aberdeen, Strathclyde

ISSN 2334-3745 65 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 and from Edinburgh’s Napier University. He can be reached at: [email protected] Notes [1] See Gary Ackerman and Lauren E. Pinson, “Speaking Truth to Sources: Introducing a Method for the Quantitative Evaluation of Open Sources in Event Data,” Studies in Conflict & Terrorism, 39, nos. 7–8 (2016): p. 618. [2] For further discussion on the issues of terrorism data and analysis, see: Omi Hodwitz, “Recognizing & Resolving Issues in Terrorism Research, Data Collection & Analysis”, RESOLVE, October 2019; URL: https://resolvenet.org/. Also see: Sheehan, Ivan Sascha, “Assessing and Comparing Data Sources for Terrorism Research”, in Evidence-based Counterterrorism Policy, edited by Cynthia Lum and Leslie W. Kennedy. New York: Springer, 2012, pp. 13–40. [3] See: URL: http://internationalcrimesdatabase.org/ForeignFighters [accessed 29/01/2020]. [4] See: Ravndal, Jacob Aasland, “Right-Wing Terrorism and Violence in Western Europe: Introducing the RTV Dataset,” Perspectives on Terrorism, Vol. 10, Issue 3 (June 2016). Online at: https://www.universiteitleiden.nl/perspectives-on-terrorism/ archives/2016#volume-x-issue-3 [5] See: Ambrozik, Caitlin, “Countering Violent Extremism Globally: A New Global CVE Data set,” Perspectives on Terrorism, Vol. 13, Issue 5 (October 2018). Online at: https://www.universiteitleiden.nl/perspectives-on-terrorism/archives/2019#volume-xiii- issue-5

ISSN 2334-3745 66 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Online Deceptions: Renegotiating Gender Boundaries on ISIS Telegram by Meili Criezis

Abstract

This resarch note examines the ways in which Islamic State supporters on Telegram, an encrypted messaging app, renegotiate gender boundaries. The introduction positions receptions of female ISIS accounts in the online space within the context of the roles that women are expected to fill and ISIS’s tentative acceptance of women fighting on the battlefield. An overview of Telegram gender social norms is provided before discussing the methodology used to gather supporting archival data to analyze the renegotiation of gender boundaries on Telegram. This section is followed by an analysis of a case study that considers the wider implications of what this says about women’s agency and involvement in terrorist groups online. The conclusion addresses the policy implications of possible shifts in gender social norms and the shape that women’s engagement in violent jihadist groups might take in the future.

Keywords: Islamic State, women, Telegram, propaganda, gender

Introduction

Substantial research has examined women’s participation and membership in terrorist groups—particularly in the Islamic State.[1] While findings suggest that ISIS’s approach concerning women’s roles within the organization have not greatly diverged from its predecessor and other violent jihadist groups, the unique set of challenges ISIS faced during its period of territorial decline forced it to deal with existential threats head-on and utilize more unconventional means.[2] One such solution was to tentatively push the boundaries of the permissibility of women’s engagement in active combat. These shifts emanating from ISIS’s core[3] were gradual and female members continued to remain largely restricted. In contrast, the online environment has provided unique opportunities for women to become increasingly autonomous and there is evidence that suggests that the social dynamics among online supporters may be shifting away from the stricter gender segregation rules that have continued, and in many cases continue, to determine social behavior on ISIS Telegram. In order to understand the significance of these shifts taking place online, it is important to first contextualize them against the wider backdrop of ISIS’s policies on women.

In “The Mujahidat Dilemma: Female Combatants and the Islamic State” (2017), Charlie Winter and Devorah Margolin provide an overview of documents that have specifically addressed women’s roles which emphasized non-combatant positions in normal conditions but deemed direct participation in fighting as valid under certain circumstances such as a shortage of male fighters or territorial losses.[4] The documents discussed were: the Khansa Brigade manifesto, “Valuable Advice and Important Analysis on the Rules for Women’s Participation in Jihad” from the Zawra’ Foundation, and continued discussions featured in Dabiq, Rumiyah and al-Naba’.[5] In fact, “women are referenced in the 28 issues of Dabiq and Rumiyah more than 1,500 times.”[6]

Additionally, firsthand accounts from women who joined ISIS verify that the organization maintained strict gender segregation and emphasized the importance of motherhood and being a supportive wife along with domestic duties.[7] This gender segregation “practically reduced mixing between opposite sexes and has provided a functioning environment to utilize women in different roles.”[8] Nonetheless, some women still expressed the desire to fight on the front lines but were corrected in their misunderstanding that they would be allowed to join men on the battlefield.[9] Then in February 2018, al Hayat Media Center released a video titled

ISSN 2334-3745 67 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

“Inside the Caliphate 7” showing women engaged in combat:

Figure 1: Image of Women Engaged in Combat [10]

More photos and videos of this nature appeared during the period of the battle of Baghouz where women were permitted to pick up a weapon and fight side by side with men:

Figures 2–5: Photos and Social Media Posts on Female Fighters [11]

Baghouz represented the lingering remnant of a so-called caliphate that once encompassed a population of almost 12 million people in a territory the size of Britain.[12] Although the images presented above are not from ISIS’s official media outlets, the fact that supporters circulated them among themselves suggests that images of women fighting had an impact but again, this only came to fruition under the conditions produced by such dire circumstances. However online, women have had significantly more influence in mixed gendered spaces long before ISIS’s decline. For example, Aqsa Mahmood, who went by Umm Layth, was an influential female ISIS propagandist.[13] In the following screenshots from Tooba Gonadal, another female propagandist who went by “Umm Muthana”, it is apparent that her messages were available to a wider public audience but the images and texts highlighted her female identity in order to demonstrate what female empowerment looked like in the Islamic State:

Figures 6-7: Social Media Posts of Female Fighter “Tooba Gonadal”[14]

ISSN 2334-3745 68 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

It could be argued that a portion of the generic propaganda produced by these women is aimed at a wide audience regardless of gender, but the messenger’s female identity remained strategically relevant and integral to the message itself. This is for several reasons: women have been able to directly recruit other women without encountering gender barriers via targeted propaganda, women’s efforts in supporting the Islamic State have been used to criticize men who do not display enough dedication to the cause, and their presence as ISIS supporters has played a crucial role in constructing an alternative narrative that directly challenges what ISIS supporters view as the falsehoods of “Western” feminism.[15]

While it is tempting to interpret the presence of these female propagandists as evidence that women are exercising their agency, the ways in which they frame their propaganda and their decision to take on the role of propagandists tend to abide by ISIS’s gender norms and expectations. As Elizabeth Pearson explains, “work on women’s political violence is often focused on the assertion of women’s ability to exercise agency, while neglecting analysis of the structures and norms that often seek to limit that agency.”[16] Despite certain limitations, women have been able to level the playing field. The case study of two female admins who ran a predominant unofficial pro-ISIS English language Telegram channel, called “GreenB1rds,” serves as an example.

Before discussing the methodology with which data concerning this case was gathered and the background details of GreenB1rds, it is helpful to provide a brief overview of the ISIS Telegram community’s approach to female accounts. Chelsea Daymon describes her observations of how various rules are enforced to maintain gender segregation: On pro-ISIS Telegram, overtly female accounts have limited access. Some channels or groups even post rules of engagement, specifying that “sisters are not allowed.” When joining channels or groups with a female themed account, many administrators (admins) will eventually if not quickly, kick female accounts out of the large majority of channels or groups on the platform. Additionally, admins will sometimes send a private message chastising a female account for joining the group before restricting entry. Thus, pro-ISIS Telegram provides limited access to female accounts. There are specific channels and groups for female ISIS supporters, but these tend to discuss issues like being a good wife, proper dress codes, and more “female oriented” discussions. In this way, pro-ISIS Telegram creates a segregated online ecosystem, unless women conceal their gender online by using gender-neutral accounts or posing as males.[17]

Daymon’s last point about women entering groups under gender-neutral names to circumvent restricted access is discussed by Telegram ISIS supporters.[18] There is no doubt that women employ these evasive methods in order to gain full access to groups, but it would be impossible to analyze the percentage of ‘false’ male accounts due to the anonymous nature of the online world. This further highlights the significance of the GreenB1rds case because the individuals connected to that channel and account have been publicly verified as women.

Methodology

The author acquired access to a wide array of ISIS channels and groups by joining them through links that were periodically posted in channels and groups that she was already in. Telegram monitoring took place from mid-October, when the news first announced the arrests, until late November. Various ISIS accounts shared URLs to the news articles shortly after the articles appeared online and it generated conversations on gender. Any mentioning of GreenB1rds, the female admins, and references to gender from both channels and individual accounts in groups were documented and archived for later reference. Keywords the author kept in mind while looking for evidence included “GreenB1rds”, “women”, “sisters” “haram”. While the news caused concern among supporters, discussions about the GreenB1rds arrests did not last past a couple of weeks at most and the ISIS Telegram ecosystem quickly moved onto other topics. However, it is important to mention that GreenB1rds propaganda continued, and still continues, to be shared widely by supporters and pro-ISIS channels demonstrating a long-lasting impact.

ISSN 2334-3745 69 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Given the anonymity of online accounts, particularly with supporters of terrorist organizations, several factors could skew the conclusions taken from the archival data:

• The accounts are undercover law enforcement or online ISIS hunters and are, therefore, not representative of feedback from true ISIS supporters[19] • Male commenters responding to the news of the GreenB1rds are women concealing their identities with male account names • The author did not access other channels and accounts that discussed GreenB1rds during the aggregation of archival data and missed opportunities to include a wider variety of responses

Case Study: GreenB1rds

In October 2019, police in the Netherlands and in the UK arrested two individuals responsible for running a popular English language pro-ISIS Telegram channel and account called “GreenB1rds.”[20] Although news articles did not provide many details, the woman in the UK “allegedly created a false persona of herself as a man…and instructed a number of administrators so that they could continue after her suicide bombing.”[21]

ISIS supporters’ reactions to the revelation that two GreenB1rds admins were female reveals how the nature of the online echo chamber shifts when real identities are disclosed. Once the news of the GreenB1rds arrests became known, supporters reacted in several ways: They warned others to be cautious about operational security, they made supplications for the women’s protection, and a supporter specifically addressed gender by responding, “Please ikhwan (brothers) in the future can u not allow our precious pearls to run such delicate groups/channels.”[22] Another pro-ISIS channel shared a message asserting that “many sisters wish they were men” and simultaneously shamed men for not taking action while women could only dream of such a chance. [23]

The fact that GreenB1rds received gender-based feedback indicates a number of points:

• Women, who undoubtedly had a hand in spreading ISIS propaganda and plotting attacks, were nonetheless criticized regardless of their contributions to ‘the cause’ because of a single factor: their gender which, in turn, made them delicate “precious pearls” who were ultimately unfit to take on a leadership role in the eyes of the male critic. • The individual who refers to the female admins as “precious pearls” is under the impression that the male accounts would somehow be able to enforce gender-based rules that would apply in offline contexts and maintain control in online spaces. In other words, his response reflects an attempt to directly translate real-world social norms to Telegram. • Women, in this case, the GreenB1rds admins, were used to shame men who had not taken action: the implication being that men were not fulfilling their masculine duty in their failure to contribute. • The individual who posted “many sisters wish they were men” understands the inherently limiting nature of being a female ISIS supporter and acknowledges that this sentiment may be widely shared among other women. The comment speaks to a certain level of self-awareness on the part of the original poster and it attempts to shame male ISIS supporters by addressing a certain male “privilege”—a male privilege that allows them to fully engage in violent jihad while women often face numerous restrictions.

Responses from accounts with male usernames[24] who expressed concern and support reveal an equally important point: The lack of gender-based feedback, in many of the responses, signifies a willingness to fully accept the female GreenB1rds admins’ efforts regardless of their gender and their attempts to deliberately deceive fellow ISIS supporters into thinking that they were men. This indicates an increasing flexibility regarding the acceptance of women which reflects the increasing pressures on ISIS’s online ecosystem, as demonstrated by

ISSN 2334-3745 70 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 one commenter in a chat group, “…many sisters help with media now akhi. We are short many brothers.”[25]

There is no single consensus on the matter of women’s engagement, but debates centered on women’s inclusion or exclusion continue to organically develop within these private groups which demonstrates that at least some supporters themselves are willing to be more flexible in their ideology, regardless of positions expressed in ISIS’s official media outlets. These complicated and shifting internal dynamics explain why some women choose to avoid mentioning their gender altogether and, in the case of the female GreenB1rds admin from the UK, may go one step further by allegedly deceiving other online ISIS supporters into thinking that they are men. Despite the looser parameters online, passing as a man ensures that the individual is able to fully participate without facing possible obstacles that they might otherwise encounter if they had chosen to reveal their gender. Interestingly, the GreenB1rds channel had previously posted a message asking “sisters” in groups to avoid sharing photos, using overtly feminine names and “strictly no free-mixing in chats”.[26] It intentionally encouraged deception in quite explicit terms. The emphasis on “no free-mixing in chats” is somewhat ironic given that the female admins engaged in conversation in groups that were supposed to be all-male. To the author’s knowledge, ISIS has not solidly addressed the permissibility of lying about one’s identity online in order to enter groups, participate in the so-called ‘media jihad’, or the actual plotting of attacks under non-dire circumstances.

It would be interesting to consider how receptions to GreenB1rds might have differed if the female admins had disclosed their gender openly. What is known is that they passed as male to obtain unquestioned access to all parts of the ISIS Telegram community and exert influence through their channel. This level of agency and equalizing the space depended solely on these women’s ability to hide their female identities. The degree of impact that the original GreenB1rds had on the ISIS echo-chamber is difficult to measure but the nature of the content it produced, which ranged from bomb making instructions to threats to more generic propaganda, was widely shared.[27] The fact that the content was produced in English added to its relevancy among English- speaking supporters and by extension, widened accessibility to a larger audience.

Online channels, such as GreenB1rds, challenge conceptions of the ways in which women’s participation and engagement in terrorist activities may take shape. Katherine E. Brown states that it is important to recognize “women’s agency as extending beyond the private sphere challenges many of our inherited gender images…”[28] Observing how parts[29] of the online ISIS ecosystem renegotiate gender boundaries offers numerous important insights: understanding how terrorist groups across ideologies may re-evaluate women’s participation, following the possibly evolving nature of gender dynamics and how various contexts can force supporters to inconsistently move the line, and recognizing the ways in which Islamic State supporters attempt to frame varying narratives of women’s empowerment—even if some of these narratives conflict with one another.

Conclusion and Further Research Opportunities

ISIS has lost most of its territorial claims but, as countless terrorism researchers have pointed out, their online presence remains strong despite attempts to disrupt their networks.[30] Late November of 2019 saw a major crackdown on ISIS accounts, channels, and groups as part of a coordinated effort between Telegram and Europol.[31] However, according to Amarnath Amarasingam, “Playing a role in ISIS’s cyber frontline was hugely rewarding…the very act of getting suspended, collectively strategizing ways to get back online, helping fellow supporters prop up their accounts and networks all became personally, emotionally, and socially significant…The results of deplatforming are now playing out in real time before our eyes, as ISIS supporters shop around for a new and stable home.”[32] As the online battle against ISIS continues, female ISIS supporters will remain engaged and, as demonstrated by GreenB1rds, they have the ability to simultaneously take on the multiple roles of propagandists, recruiters, facilitators, planners, and attackers.[33]

ISSN 2334-3745 71 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

More data would need to be gathered to definitively determine if a shift in acceptance of what women can or cannot do as members of ISIS’s online echo-chambers is occurring but if it is, this development would have significant policy implications. ISIS’s ability to establish itself as a proto-state meant that it entered untested waters and the diverging points that distanced it from its predecessor, al Qa’ida, provided it with opportunities for re-creation. Part of that process included an acceptance, albeit minimal and limited, of women on the battlefield as soldiers. David Cook highlights that legal sources deemed it permissible: “According to the legal sources, if the necessity for jihad is incumbent on the entire Muslim community, then women do have the option of fighting. But most still say that even in extreme circumstances women fighting remains an option, not an obligation.”[34]

On the other hand, online supporters are distanced from direct control by ISIS’s administration which allows for the organic development of discussions that might not have happened under physical proximity to ISIS’s territorial so-called caliphate. While supporters’ online social patterns mirror official edicts from ISIS in many ways, shifts in official propaganda create an atmosphere that is open to change. When thinking about potential terrorism trends in the next decade, it is necessary to ask if ISIS’s policies could undergo more radical policy shifts and if future violent jihadist groups might incorporate women as soldiers by citing ISIS as a precedent. If this does occur, it will be crucial to consider how such a stance could be portrayed in both official and unofficial online propaganda and to what degree that message would resonate with female supporters globally.

Note: The author would like to thank, in no specific order, Dr. Victor Asal, Dr. Matthew Ward, Chardon Murray, Chelsea Daymon, and Dr. Amarnath Amarasingam for their input and comments.

About the Author: Meili Criezis worked at the Office of Public Safety and Homeland Security on a two-year grant as an analyst with a research focus on violent extremism across ideologies, extremist online propaganda, and community resiliency initiatives. She is currently an independent researcher and her most recent academic publication is “Islam, Gender, and the Algerian Revolution for Independence” (Visions and Revisions, 2018).

Notes [1] Jessica Davis, Women in Modern Terrorism: From Liberation Wars to Global Jihad and the Islamic State, Maryland: The Rowman & Littlefield Publishing Group Inc., 2017; Edited by Laura Sjoberg & Caron E. Gentry, Women, Gender, and Terrorism, Athens & London: The University of Georgia Press, 2011. [2] Charlie Winter, “ISIS Women and Jihad Breaking with Convention,” ISIS, Women and Jihad: Breaking With Convention, Tony Blair Institute for Global Change, September 13, 2019, p. 9. [3] The term “core” refers to both ISIS’s territorial caliphate and its official propaganda outlets [4] Charlie Winter and Devorah Margolin, “The Mujahidat Dilemma: Female Combatants and the Islamic State,” CTC Sentinel Volume 10 Issue 7, August 2017, p. 26: https://ctc.usma.edu/app/uploads/2017/08/CTC-Sentinel_Vol10Iss7-9.pdf [5] Charlie Winter and Devorah Margolin, “The Mujahidat Dilemma: Female Combatants and the Islamic State,” p. 26. [6] Stephane J. Baele, Katharine A. Boyd and Travis G. Coan, ISIS Propaganda: A Full-Spectrum Extremist Message, New York: Oxford University Press, 2020, p. 119. [7] Erin M. Saltman and Melanie Smith, “’Till Martyrdom Do Us Part’ Gender and the ISIS Phenomenon,” Institute for Strategic Dialogue, 2015, p. 14.

[8] Hamoon Khelghat-Doost, “Women of the Caliphate: The Mechanism for Women’s Incorporation into the Islamic State (IS),” Perspectives on Terrorism, Volume 11 Issue 1, February 2017, p. 21. [9] Michael Martinez, Ana Cabrera and Sara Weisfeldt, “Colorado Woman Gets 4 Years for Wanting to Join ISIS,” CNN, January 24, 2015: https://www.cnn.com/2015/01/23/us/colorado-woman-isis-sentencing/index.html; Carolyn Hoyle, Alexandra Bradford, and Ross Frenett, “Becoming Mulan? Female Western Migrants to ISIS,” Institute for Strategic Dialogue, 2015, p. 32. [10] Europol Specialist Reporting, “Women in Islamic State Propaganda: Roles and Incentives,” Europol, p. 26.

ISSN 2334-3745 72 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

[11] From personal archives, March 23, 2019. [12] Rukmini Callimachi, “ISIS Caliphate Crumbles as Last Village in Syria Falls,” , March 23, 2019: https://www. nytimes.com/2019/03/23/world/middleeast/isis-syria-caliphate.html [13] Farhana Qazi, Invisible Martyrs: Inside the Secret World of Female Islamic Radicals, Oakland: Brett-Koehler Publishers Inc., 2018, p. 125. [14] Simon Cottee, “Tracking the Online Life of a Female ISIS Recruiter from the UK,” Vice, January 15, 2016: https://www.vice.com/ en_us/article/jma4wk/umm-muthanna-al-britania-syria-828; Lizzie Dearden, “Tooba Gondal: Female British ISIS recruiter asks to return to the UK saying ‘we just want a normal life’”, Independent, April 2, 2019: https://www.independent.co.uk/news/world/ middle-east/tooba-gondal-isis-bride-women-syria-british-jihadi-uk-a8851656.html [15] Mia Bloom with John Horgan, Small Arms: Children and Terrorism, Ithaca and London: Cornell University Press, 2019, p. 51. Bidisha Biswas & Shirin Dylami, “Radicalizing female empowerment: gender, agency, and affective appeals in Islamic State propaganda,” Small Wars & Insurgencies, 2019: https://doi.org/10.1080/09592318.2019.1649831 [16] Elizabeth Pearson, “Why Men Fight and Women Don’t: Masculinity and Extremist Violence,” Tony Blair Institute for Global Change, September 13, 2018, p. 7. [17] Email communication with Chelsea Daymon on December 12, 2019. [18] From personal archives, July 2018. [19] It is highly unlikely that accounts making pro-ISIS comments are academics or journalists given the ethical standards by which they must abide. [20] “Woman arrested in Uithoorn for running IS support Telegram service,” DutchNews, October 11, 2019: https://www.dutchnews. nl/news/2019/10/woman-arrested-in-uithoorn-for-running-is-support-telegram-service/ [21] Richard Spillett, “Female ‘ISIS supporter’, 36, appears in court accused of plotting to bomb St Paul’s Cathedral and a London hotel after ‘pledging support for terrorist group,’” Daily Mail, October 16, 2019: https://www.dailymail.co.uk/news/article-7580413/ Woman-court-alleged-ISIS-plot-bomb-St-Pauls-Cathedral.html [22] Telegram screenshot from personal archives. October 17, 2019. [23] Telegram screenshot from personal archives. October 17, 2019. [24] Caveat: It is impossible to confirm if the people behind these accounts are male or female but this conclusion is based on the assumption that they are male as presented by their usernames. [25] From personal archives, July 2018. [26] Telegram screenshot from personal archives. September 2019. [27] Imitation accounts and channels calling themselves “GreenB1rds” have appeared since the arrests of the original female admins. [28] Edited by Laura Sjoberg & Caron E. Gentry, Women, Gender, and Terrorism, p. 214 [29] While GreenB1rds and the various commenters compose a tiny fraction of ISIS Telegram, their actions and reactions reveal the ways in which gender boundaries are being renegotiated. [30] Michael Krona and Rosemary Pennington, The Media World of ISIS, Bloomington: Indiana University Press, 2019, p. 6. [31] Amarnath Amarasingam, “Telegram Deplatforming ISIS Has Given Them Something to Fight For,”Vice , December 5, 2019: https://www.vice.com/en_us/article/vb55bd/telegram-deplatforming-isis-has-given-them-something-to-fight-for [32] Amarnath Amarasingam, “Telegram Deplatforming ISIS Has Given Them Something to Fight For,” https://www.vice.com/ en_us/article/vb55bd/telegram-deplatforming-isis-has-given-them-something-to-fight-for [33] Seran de Leede, “Women in Jihad: A Historical Perspective,” The International Centre for Counter-Terrorism – The Hague, May 2018: https://icct.nl/wp-content/uploads/2018/09/ICCT-deLeede-Women-in-Jihad-Sept2018.pdf [34] David Cook, “Women Fighting in Jihad?” Studies in Conflict and Terrorism,28:275-384, 2005, p. 379.

ISSN 2334-3745 73 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

David M. Jones, Paul Schulte, Carl Ungerer, and M.L. R. Smith (Eds.), Handbook of Terrorism and Counter Terrorism Post 9/11. (Cheltenham, Glos., UK: Edward Elgar, 2019), 447 pp., £ 185.-/US $ 243.00 [Hardcover], ISBN: 978-1-7864-3801-0;/ £ 166.50 .00 [Web Edition], ISBN: 978-1- 7864-3802-7. Reviewed by Alex P. Schmid

As most of those interested in terrorism and counter-terrorism find themselves unable to absorb the thousands of new papers, reports, articles, book chapters and monographs that become available every year, there has been a growing demand for handbooks on these subjects, driven by the hope that they would separate wheat from chaff. Recent handbooks include The Oxford Handbook of Terrorism, edited by Erica Chenoweth et al (Oxford: OUP, 2019, 795 pp.), The Palgrave Handbook of Global Counterterrorism Policy, edited by Scott N. Romaniuk et al (New York: Palgrave Macmillan, 2017, 1098 pp.), and The Routledge Handbook of Terrorism and Counterterrorism, edited by Andrew Silke (Abingdon: Routledge, 2019, 694 pp.). The most recent addition is the Handbook of Terrorism and Counter Terrorism Post 9/11 by two Australia-based (D.M. Jones & C. Ungerer) and two UK -based editors (P. Schulte & M.L.R. Smith), published in December 2019. One third of the authors are associated with London’s King’s College while one fifth are from various Australian universities. Some of the contributors (e.g. Rajan Basra, Michele Groppi, Annamaria Kiss and Gina Vale) are promising newcomers to the field of terrorism studies while others (e.g. William Rosenau, Seamus Hughes and Andrew T.H. Tan) are old hands. The volume contains 13 chapters in Part I, focusing on general themes, and 18 chapters in Part II, focusing on regional and country studies, plus one introductory and two concluding chapters. The editors admit that the contributors to this volume cannot “....resolve any of the extant theoretical, definitional and practical policy dilemmas that they highlight”. Rather, they seek to “....outline the various directions in which informed scholarship and research is advancing” (p.9). This book addresses relatively underexplored topics like ‘Counter-terrorism with Chinese characteristics’ (chapter 28 by Rosita Dellios) and ‘Future war, AI, drones, terrorism and counterterror’ (chapter 34 by Paul Schulte), but is largely silent on new developments in Africa (except for John Maska’s ‘A tale of two strategies: the enduring African legacies of Hassan al-Banna and Sayyid Qutb – chapter 21). Latin America also receives scant attention, except for Markus-Michael Müller’s chapter 30 ‘Terrorism and insurgency in post-9/11Latin America’. South Asia also has only one chapter (Prem Mahadevan’s chapter 26 ’South Asia: from terrorism to radicalism’). There is, however, another chapter (chapt. 27) on Southeast Asia from the hand of Andrew T.H. Tan. On the other hand, there is plenty of attention for the communicative aspects of terrorism: Tim Stevens has a chapter (chapt. 4) on ‘Strategic cyberterrorism: problems of ends, ways and means’, while Jonathan R. Woodier and Andreas Zingerle focus in chapter 6 on ‘The Internet and cybersecurity: taking the virtual fight to cybercrime and cyberwarfare’. Joshua Rovner addresses hischapter 9 on ‘Intelligence in the age of ’, while Jonathan R. Woodier is the author of ‘The media and terror: undermining information asymmetry’ (chapter 8). The authors of this volume represent mainstream, and mostly realist, perspectives on terrorism rather than the critical terrorism studies school. About the latter, two of the four editors of the volume, D. M. Jones and M.L.R. Smith, in chapter 10, titled ‘Critical theory and terrorism’, note that ‘….critical terrorism studies requires no research into the history, ideology, or strategic thinking of transnational non-state actors like al-Qaeda or its regional affiliates. Instead, critical engagement is a euphemism for an assault on the Australian, British and US government responses to terrorism….” (p.117). This is not to say that the editors themselves are not critical in their own way about US and UK government responses to terrorism after 9/11. Indeed, in their introductory chapter 1, they take issue with “…the incoherence that characterized the Western response to 9/11” (p.1). They also refer to ‘[t]he intellectual confusion surrounding how to think about what the events of 9/11 signified….” (p.1).

ISSN 2334-3745 74 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

However, in their attempt to cut through the Gordian knot of existing confusions, in one of the final chapters (chapt. 33 - ‘ Strategy and terrorism: discourse and analysis’), M.L.R. Smith and David Martin Jones come up with a dozen items some of which are themselves, at least to this reviewer, debatable or confusing: “1.Terrorism is not hard to define; 2.Terrorism is not an independent social reality; 3.Terrorism has no causes; 4. Terrorism can only be a practice (a tactic); 5.Terrorism is a rational tool of policy; 6.Terrorism is not indicative of behavioural or mental problems; 7. Terrorism is not a coherent means of applying moral judgment; 8. Terrorism does not possess any intrinsic link with non-state actors; 9.Terrorism is not a weapon of the weak;10. There are no such things as terrorist organizations; 11. The notion of a ‘terrorist’ is equally erroneous; 12. One person’s terrorist is not another person’s freedom fighter” (pp. 409-411). The editors try to make their case for these propositions in some detail which, however, cannot be reproduced here in the framework of a book review. All in all, this Handbook of Terrorism and Counter Terrorism Post 9/11 is a welcome addition to existing efforts to survey the field of (counter-)terrorism studies. No university library should be without it.

About the Reviewer: Alex P. Schmid is Editor-in-Chief of ‘Perspectives on Terrorism’.

ISSN 2334-3745 75 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Counterterrorism Bookshelf: 62 Books on Terrorism & Counter- Terrorism-Related Subjects Reviewed by Joshua Sinai

So many books are published on terrorism- and counterterrorism-related subjects that it is difficult to catch up on a large backlog of monographs and edited volumes received for review. In order to deal with this backlog, this column consists of capsule Tables of Contents of 62 books, including also several books published less recently but still meriting attention. Some of the new books will be reviewed in future issues of ‘Perspectives on Terrorism’ as stand-alone reviews. The books are listed topically.

General

Paul Ashley, The Complete Encyclopedia of Terrorist Organisations – Concise Edition(Havertown, PA: Casemate, 2012), 396 pp., US $ 16.95 [Paperback], ISBN: 978-1-6120-0118-0.

Table of Contents: Terrorist Encyclopedia; Numerical, A-Z; Web Sites used to collate the information in this book; Appendix A: Organisations Banned by the United Kingdom; Appendix B: Organisations Banned by the United States of America.

Jean-Paul Azam and Véronique Thelen, Fighting Terrorism at Source: Using Foreign Aid to Delegate Global Security (Northampton, MA: Edward Elgar Publishing, 2018), 200 pp., US $ 99.00 [Hardcover], ISBN: 978-1- 7864-3216-2.

Table of Contents: Introduction and Overview; Part 1: Getting the Questions Right; Targets and Perpetrators of Transnational Terrorist Attacks; Why Suicide Terrorists Get Educated; Aid and Military Intervention in a Model of Delegated Protection; Part 2: Empirical Answers; Testing the Impacts of Foreign Aid and Military Interventions; Estimating the Speed of Terrorist Responses; The Problem of Imported Attacks; General Conclusion.

Ofer Fridman, Russian ‘Hybrid Warfare’: Resurgence and Politicisation (London, , UK: Hurst/New York, NY: Oxford University Press, 2018), 288 pp., US $ 40.00 [Hardcover], ISBN: 978-0-1908-7737-8.

Table of Contents: Introduction; Part I: The Rise of Hybrid Warfare; The Conceptual Foundations of ‘Hybrid Warfare’; The Birth of ‘Hybrid Warfare’;Part II: The Rise of Gibridnaya Voyna – The Russian Theory of Hybrid Warfare; Reading Evgeny Messner: The Theory of ‘Subversion-War’ (Myatezhevoyna); Net-Centric and Information Wars: Modern Theories of Subversion; The Rise of Gibridnaya Voyna; Part III: The Politicisation of Hybrid War and Gibridnaya Voyna; ‘The Russians Are Coming’ – The Politicisation of Russian Hybrid Warfare; ‘Gibridnaya Voyna Against Us Is Coming’ – The Politicisation of Western Gibridnaya Voyna; Conclusions: The Rise of Russian ‘Hybrid War’: Lessons for the West; P.S. – A Lesson for Russia.

Ignacio Sánchez-Cuenca, The Historical Roots of Political Violence: Revolutionary Terrorism in Affluent Countries (New York, NY: Cambridge University Press, 2019), 296 pp., US $ 39.99 [Hardcover], ISBN: 978-1- 1084-8276-9.

Table of Contents: Introduction (A Long-Term Approach, Revolutionary Terrorism, Sparks); The Argument: From Development Paths in the Interwar Years to Revolutionary Terrorism in the 1970s (The (Re-)Emergence of Radicalism in the “Golden Age” Period, Radicalism and Extremism, Paths of Development); Revolutionary Terrorism and Its Ideological Roots (The Ideology of Violence, Havana-Montevideo-Buenos Aires-Berlin, A

ISSN 2334-3745 76 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Profile of Revolutionary Terrorism in the Developed World); The Major Cases of Revolutionary Terrorism (Introduction, Italy, , Germany, , Greece and Portugal); Contemporary Effects and Background Conditions (Introduction, State Efficacy and Social Support, Hypotheses, Data and Measurement, Contemporary Variables, Background Conditions); The Long-Term Determinants of Revolutionary Terrorism (The main Hypothesis Restated, Measuring Development Paths, Liberal and Non-Liberal Countries, Statistical Analysis, Summary); Historical Mechanisms: Radicalism and Repression (Mechanisms Based on State Legitimacy and Support for Extremism, The Strength of the Radical Left, Negative Cases: The Non-Lethal Terrorist Groups, Repression and Past Authoritarianism, Conclusion); Individualism, Modernization, and Violence (Introduction, Individualism, Measuring Individualism, Remote Culture: Family and Language, Revolutionary Terrorism, Development Paths, and Remote Culture, Conclusions: The Long-Term Determinants of Development and Violence).

Philip Seib, As Terrorism Evolves: Media, Religion, and Governance (New York, NY: Cambridge University Press, 2017), 202 pp., US $ 99.99 [Hardcover], US $ 24.99 [Paperback], ISBN: 978-1-1084-1169-1.

Table of Contents: Preface; Introduction; The Nature of the Beast; In God’s Name; Organizing Terrorism; Media Weaponry; What Lies Ahead?

Terrorism – Psychology

Steven Hassan, Freedom of Mind: Helping Loved Ones Leave Controlling People, Cults and Beliefs (Newton, MA: Freedom of Mind Press, 2013), 268 pp., US $ 16.95 [Paperback], ISBN: 978-0-9670-6881-7.

Table of Contents: Introduction; Cult Common Denominators; What Is Destructive Social Influence; Strategic Interactive Approach; Evaluating the Situation; Building the Team; Empowering Members of the Team; Understanding Cult/Person’s Beliefs and Tactics; Interacting with Dual Identities; Communication Strategies; Unlocking Phobias; Promoting Freedom of Mind: the Prep Meeting and Beyond; Planning and Holding an Intervention; A Call to Action.

Steven Hassan, Combating Cult Mind Control [30th Anniversary Edition] (Newton, MA: Freedom of Mind Press, 2018), 392 pp., US $ 18.95 [Paperback], ISBN: 978-0-9670-6882-4.

Table of Contents: Introduction to the 2018 Edition; Foreword to the 1988 Edition; Preface to the 2016 Edition; My Work as a Cult Expert; My Life in the Unification Church; The Threat: Mind Control Today; Understanding Mind Control; Cult Psychology; Courageous Survivor Stories; How to Protect Yourself and People You Care About; Curing the Mind Control Virus; How to Help; Unlocking Mind Control; Strategies for Recovery; Next Steps; Appendix: Lifton’s Eight Criteria of Mind Control.

Rex Hudson, Who Becomes a Terrorist and Why?: The Psychology and Sociology of Terrorism [Reprint Edition] (New York, NY: Skyhorse Publishing, 2018), 192 pp., $ 9.99 [Paperback], ISBN: 978-1-5107-2612-3.

Table of Contents: Preface; Executive Summary: Mindsets of Mass Destruction; Introduction; Terms of Analysis; Approaches to Terrorism Analysis; General Hypotheses of Terrorism; The Psychology of the Terrorist; Terrorist Profiling; Conclusion; Appendix: Sociopsychological Profiles: Case Studies (Exemplars of International Terrorists in the Early 1970s; Exemplars of International Terrorists in the Early 1990s; Ethnic Separatist Groups; Social Revolutionary Groups, Religious Fundamentalist Groups; New Religious Groups); Tables; Glossary. [This volume is a reprint of the 1999 edition published by the Federal Research Division of the Library of Congress].

ISSN 2334-3745 77 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Donnatella Marazziti and Stephen M. Stahl (Eds.), Evil, Terrorism & Psychiatry (New York, NY: Cambridge University Press, 2019), 188 pp., US $ 29.99 [Paperback], ISBN: 978-1-1084-6776-6.

Table of Contents: Foreword; Preface; To Die to Kill: Suicide as a Weapon. Some Historical Antecedents of Suicide Terrorism; the Philosophy of Hate and Anger; Identity, Alienation, and Violent Radicalization; The Mind of Suicide Terrorists; Psychopathology of Terrorists; Why is Terrorism a Man’s Business?; Religion, Violence, and the Brain: A Neuroethical Perspective; Brain Alterations Potentially Associated with Aggression and Terrorism; Political Terrorism and Affective Polarization in “Black” and “Red” Terrorists in Italy During the Years 1968- 1988; Conditions of Life and Death of Psychiatric Patients in France During World War II: Euthanasia or Collateral Casualties?; Neuropsychiatric Characteristics of Antiterrorist Operation Combatants in the Donbass (Ukraine); The International Scenario of Terrorism; Identification and Prevention of Radicalization, Practice and Experiences with a Multidisciplinary Working Model; How to Fight Terrorism? Political and Strategic Aspects.

Alexander T. Vazsounyi, Daniel J. Flannery, and Matt DeLisi (Eds.), The Cambridge Handbook of Violent Behavior and Aggression [Second Edition] (New York, NY: Cambridge University Press, 2018), 824 pp., US $ 185.00 [Hardcover], US $ 56.99 [Paperback], ISBN: 978-1-3166-3221-5.

Table of Contents: Introduction; Part I: Introduction and Overview; Origins of Violent Behavior over the Life Span; Longitudinal Study of Personality and Social Development: Insights about Aggression after Five Decades; A Life-Course Model for the Development of Intimate Partner Violence; The Dark Violence Hybrid: The Cross- Cultural Validation of an Integrated Model; Part II: Biosocial Foundations of Violence and Aggression; The Behavioral Genetics of Aggression and Violent Behavior; Neuroimaging Evidence of Violence and Aggression; Biosocial Bases of Aggression and Antisocial Behavior; the Neuropsychology of Violence; The Interaction of Nature and Nurture in Antisocial Behavior; The Neurobiology of Bullying Victimization; Molecular Genetics of Aggression and Violent Crime; Biosocial Foundations of Drug Abuse and Violent Delinquency; Personality and Aggression: A General Trait Perspective; Part III: Individual and Interpersonal Factors for Violence and Aggression; Applying Empirically-based Trait Models to an Understanding of Personality and Violence; Social- Cognitive Processes in the Development of Antisocial and Violent Behavior; Violent Juvenile Offenders: A Psychiatric and Mental Health Perspective; Self-Control Theory and Criminal Violence; Peers and Aggression: From Description to Prevention; Developmental Processes of Resilience and Risk for Aggression and Conduct Problems; Child Abuse and Neglect; The Role of Gender in Violent and Aggressive Behaviors; Lessons Learned: Serial Sex Offenders Identified from Backlogged Sexual Assault Kits (SAKs); Research on Social Structure and Cross-National Homicide Rates; Preventing Violent Crimes by Reducing Wrongful Convictions; Strain Theory and Violent Behavior; On Cumulative Childhood Traumatic Exposure and Violence/Aggression: The Implications of Adverse Childhood Experiences (ACE);Part IV: Contextual Factors for Violence and Aggression; Youth Gangs and Violent Behavior; Social Networks and Violence; The Contagion of Violence; School Violence; Violence and Culture in the United States; Violence Prevention in a Global Context: Progress and Priorities for Moving Forward; Terrorism as a Form of Violence; Psychopharmacology of Violence; Individual, Family, Neighborhood and Regional Poverty/Socioeconomic Status and Exposure to Violence in the Lives of Children and Adolescents: Considering the Global North and South; Firearms and Violence; Part V: Looking Toward the Future; The Interrelationship of Self-Control and Violent Behavior: Pathways and Policies; The New Frontier: Leveraging Innovative Technologies to Prevent Bullying; Neural Substrates of Youth and Adult Antisocial Behavior; Research Designs and Methods for Evaluating and Refining Interventions for Youth Violence Prevention; New Directions in Research on Violence: Bridging Science, Practice, and Policy.

ISSN 2334-3745 78 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Terrorism – Religion

Radhamim Emanuilov and Andrey Yashlavsky [Translated from Russian by Michael Sigal], Terror in the Name of Faith: Religion and Political Violence (Boston, MA: Academic Studies Press, 2011), 270 pp., US $ 99.00 [Hardcover], ISBN: 978-1-9362-3580-3.

Table of Contents: Introduction; Islamist Terrorism: A Perversion or the Norm?; The Ideological Roots of Religious Terrorism: Salafism and Jihadism; Palestine: From Left-Wing Nationalism to Islamism; The Islamic Revolution: The Export Version; Al-Qaeda: Terrorist Franchising; Afghanistan: From Mujahideen to Taliban; Jihadism in the Post-Soviet Landscape; Resisting Religious Extremism and Terrorism: What Should Be Done?

Nilay Saiya, Weapon of Peace: How Religious Liberty Combats Terrorism (New York, NY: Cambridge University Press, 2018), 240 pp., US $ 110.00 [Hardcover], US $ 32.99 [Paperback], ISBN: 978-1-1084-6411-6.

Table of Contents: Introduction; Religious Resurgence, Repression and Resistance; A Global View of Religious Discrimination and Terrorism across Faith Traditions; Majority Religious Cooptation, Terrorism and the Arab Spring; A Weapon of Peace; Religious Liberty and American Foreign Policy; Appendix.

Al Qaida, ISIS, and Jihad

Patrick Desbois and Costel Nastasie, The Terrorist Factory: ISIS, The Yazidi Genocide, and Exporting Terror (New York, NY: Arcade/Skyhorse Publishing, 2018), 272 pp., $ 24.99 [Paperback], ISBN: 978-1-6287-2946-7.

Table of Contents: Foreword; Preface to the English-Language Edition; Taking Up My Pen; The Lion Cubs of the Caliphate; The Children Back from the Camps; The Mass Graves; The Islamic Judge’s Wife; Not Pretty Enough; The Tailor of Raqqa; Filming ISIS; Leaving; The Brothels of ; The Suicide Bombers’ Garage; Sinjar Liberated; Epilogue.

Seth J. Frantzman, After ISIS: America, Iran and the Struggle for the Middle East (New York, NY: Gefen, 2019), 386 pp., $ 16.95 [Paperback], ISBN: 978-9-6570-2309-9.

Table of Contents: Preface; Prologue; Introduction; Part I: Holding the Line, 2014-2015; A Band-Aid for Sykes- Picot; The Bubble; The Eastern Front, The Long Road to Europe; Securing Kirkuk; The Road to Sinjar; The Hell of Sinjar; Part II: The War Against Chaos, 2016; By, with and through; Turkey’s Bad Memories; ISIS Comes to Africa; Europe Confronts Terror; Part III: The Struggle for Iraq, 2016; The Road to Qayarrah; Marching Orders; A Coup in Turkey; Zero Hour; The Battle for Mosul; The Hot Summer of 2017; Kurdistan’s Referendum; The Struggle for Kirkuk; Liberating Raqqa; Part IV: The Rise of Iran, 2017-2019; The Southern Flank; Searching for Justice; Shifting Gears to Iran; The Great Withdrawal; The Final Chapter; The Middle East at a Crossroads; A Way Forward; Epilogue: Coming Home.

Mathieu Guidere, Historical Dictionary of (Lanham, MD: Rowman & Littlefield, 2017), 650 pp., US $ 147.00 [Hardcover], ISBN: 978-1-5381-0669-3.

Table of Contents: Illustrations; Editor’s Foreword; Preface: The Muslim Wars of Religion; Reader’s Notes; Acronyms and Abbreviations; Map; Chronology; Introduction; THE DICTIONARY; Glossary; Appendix; Bibliography.

ISSN 2334-3745 79 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Pete Lentini, Neojihadism: Towards a New Understanding of Terrorism and Extremism? (Northampton, MA: Edward Edgar Publishers, 2013), 256 pp., US $ 115.20 [Hardcover], ISBN: 978-1-8472-0744-9.

Table of Contents: Introduction; On the Movement; On Jihadism; On the Movement’s Global Dimensions: Bin Laden as a Political and Spiritual Commentator; On the Movement’s Local Dimensions: The Politics and Theology of a Melbourne Cell Leader; On Attempting to Name the Enemy: Islamo-Fascism and Islamo- Totalitarianism(s); On Fascism and Totalitarianism; Conclusion: On Neojihadism – A New Understanding of Terrorism and Extremism?

Darryl Li, The Universal Enemy: Jihad, Empire, and the Challenge of Solidarity (Stanford, CA: Stanford University Press, 2020), 384 pp., US $ 90.00 [Hardcover], US $ 30.00 [Paperback], ISBN: 978-1-5036-1087-3.

Table of Contents: Terms of Engagement; Dramatis Personae; Introduction; Part I: Jihad; Migrations, Locations, Authorities; Groundings; Interlude; Exchanging Arabs; Part II: Other Universalisms; Non-Alignment; Peacekeeping, The Global .

Laurence Louër, Sunnis and Shi’a: A Political History (Princeton, NJ: Princeton University Press, 2020), 240 pp., US $ 29.95 [Hardcover], ISBN: 978-0-6911-8661-0.

Table of Contents: Introduction; Part I: Between Politics and Religion; Caliphate and Imamate; Rivalry and Convergence; Islam as Ideology: Sunni and Shi’a Islamism; An Islamist International?; From Pan-Islamism to Sectarianism; Part II: Managing Sectarian Difference; Iraq: On the Frontier of Sunnism and Shi’ism; Bahrain: The Legacy of a Conquest; Pakistan: From Muslim State to Islamic State; Pragmatic Sectarianism? Sunnis and Shi’a in Saudi Arabia and Iran; Yemen: Zaydism between Sunnism and Shi’ism; Lebanon: The Search for a New Sectarian Pact; Conclusion; Chronology.

Per-Erik Nilsson, Open Source Jihad: Problematizing the Academic Discourse on in Contemporary Europe [Cambridge Elements] (New York, NY: Cambridge University Press, 2018), 116 pp., US $ 18.00 [Paperback], ISBN: 978-1-1084-4874-1.

Table of Contents: The Looming Specter of 9/11; “Holy Rage”; European Jihad(ism); Fighting Tomorrow’s Terrorists Today; What about Violence?

Elena Pokalova, Returning Islamist Foreign Fighters: Threats and Challenges to the West (New York, NY: Palgrave Macmillan, 2020), 242 pp., US $ 74.99 [Hardcover], ISBN: 978-3-0303-3147-4.

Table of Contents: The Returnees Challenge; Foreign Fighters to Syria and Iraq: Aberration from History or History Repeated?; Foreign Fighters After the Conflict Ends; Foreign Fighter Returnees from Syria and Iraq; Dealing with the Challenge: Responses to Foreign Fighters and Foreign Fighter Returnees; Prosecution of Foreign Fighter Returnees; Women, Jihad, and Female Returnees; Child Returnees; Moving Forward; Appendix: Islamist Terrorist Attacks in the West, 1990-2019.

Chris Sands with Fazelminallah Qazizai, Night Letters: Gulbuddin Hekmatyar and the Afghan Islamists Who Changed the World (London, England, UK: Hurst, 2019), 528 pp., $ 39.95 [Hardcover], ISBN: 978-1- 7873-8196-4.

Table of Contents: Prologue: The Return; Part I: Monarchy and Republic 1965-1978; Earthquakes; A New World; ‘The Ancient Enemy’; The Insurrection; Spies;Part II: Jihad 1978-1991; The Revolution; Devils; Profession of ISSN 2334-3745 80 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Faith; Culture Wars; ‘The West is Afraid’; Black Tulips; The Mother Party; Baghdad; Exit Wounds; ‘The Century of Islam’; Part III: Civil War 1991-1996; The Fall; The Islamic State; ‘Victory or Martyrdom’; Collusion; The Great Game; Part IV: The Taliban 1996-2001; The Next War;Part V: The Americans 2001-2017; The Guests; The Reckoning.

Terrorism – Female Fighters

Christine Sixta Rinehart, Sexual Jihad: The Role of Islam in Female Terrorism (Lanham, MD: Lexington Books, 2019), 224 pp., US $ 95.00 [Hardcover], ISBN: 978-1-4985-5751-1.

Table of Contents: Introduction: The Concept of Sexual Jihad; The Roles of Women in Islam, the Quran, and the Hadith; Some Thoughts on Female Jihadist Motivation and Radicalization; The Domestics; The Secretaries; The Disposables (Mujahidat); The Women of Cohar: Convicted Jihadist Terrorists in an Israeli Prison; Female Home-Grown and Emigrant Terrorism in the United States; Conclusion.

Reed M. Wood, Female Fighters: Why Rebel Groups Recruit Women for War (New York, NY: Columbia University Press, 2019), 304 pp., US $ 105.00 [Hardcover], US $ 35.00 [Paperback], ISBN: 978-0-2311-9299-6.

Table of Contents: Introduction; Why Rebels Mobilize Women for War; The Strategic Implications of Female Fighters; Female Combatants in Three Civil Wars; Empirical Evaluation of Female Combatants; Empirical Evaluation of the Effects of Female Combatants; Conclusion: Understanding Women’s Participation in Armed Resistance; Appendix A: Version History; Appendix B: Examples of Coding Narratives from WARD; Appendix C: Survey Wording and Instrument.

Homeland Security

Clay W. Biles, Able Bodied Passenger: In-Flight Security Guide (Paradise, CA: Squawk 7500 Consultants High Order Security, 2019), 101 pp., $ 19.80 [Paperback], ISBN: 978-0-9972-2600-8.

Table of Contents: Foreword; Welcome Aboard; Identifying and Communicating In-Flight Security Threats; Assessing Cabin Security; Restraining and Detaining a Physically Abusive Passenger; Restraining and Detaining a Life-Threatening Passenger; Removing a Passenger From the Forward Area; Countering In-Flight Explosives and Suicide Bombers; Securing the Forward Area; Safety Considerations; Let’s Roll Syndrome; Preparing for a Ground Breach; Glossary; Quick Reference Guide.

Alain Burrese, Survive a Shooting: Strategies to Survive Active Shooters and Terrorist Attacks (Missoula, MO: TGW Books, 2018), 368 pp., $24.95 [Paperback], ISBN: 978-1-9378-7212-0.

Table of Contents: Foreword; Introduction; History of Mass Killings; The Problem Defined; Active Shooter/ Killer Prevention; Your Mind, Adrenaline, and Mindset; Active Shooter Response Models; Escape; Deny; Attack Back; Stop the Bleeding; When Law Enforcement Arrives; Develop Your Plan Now; A Final Message; Appendix A: Business Plan Considerations; Appendix B: Lawsuits Against Organizations After Active Shooter Events; Appendix C: Training Courses; Appendix D: Suicide Bomber Threats and Improvised Explosive Devices (IEDs); Appendix E: Surviving Terrorist Vehicle Attacks; Appendix F: Active Shooter Lessons from “The 15:17 To Paris”; Resources.

ISSN 2334-3745 81 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Counterterrorism – General

Cornelia Beyer and Michael Bauer (Eds.), Effectively Countering Terrorism: The Challenge of Prevention, Preparedness and Response (Brighton, England, UK: Sussex Academic Press/Chicago, IL: 2009), 248 pp., US $ 79.95 [Hardcover], ISBN: 978-1-8451-9303-4.

Table of Contents: Introduction; Part I: Primary Prevention; Ideology in Terrorism and Counter-Terrorism: Lessons from Combating al-Qaeda and al-Jemaah al-Islamiyah in Southeast Asia; The Root Causes of Terrorism: How to Address Them; Escaping the Prisoner’s Dilemma: Securing a Role for Human Rights in Counter-Terrorism; Part II: Countering the Threat; Teaching an Old Paradigm New Tricks: The Poverty of Traditional Security Responses to Transnational Terrorism; When International Counter-Terrorism Succeeds: Lessons from the Defeat of the ’17 November Revolutionary Organization; The Sinews of War: The Financing of Terrorist Groups; Part III: Responding to Attacks; The Effective Countering of Terrorism: Logistical and Operational Countermeasures; The Next Terror Attack: The Centrality of Media and Public Information in Preparedness Planning; Conclusion: How to Increase the Effectiveness of Counter-Terrorism.

Bruce W. Dayton and Louis Kriesberg (Eds.), Perspectives in Waging Conflicts Constructively: Cases, Concepts, and Practice (Lanham, MD: Rowman & Littlefield, 2017), 234 pp., US $ 122.00 [Hardcover], US $ 42.00 [Paperback], ISBN: 978-1-4422-6551-6.

Table of Contents: Introduction; Part I: Concepts; Communication, Constructiveness, and Asymmetry in Nonviolent Action Theory and Practice; Transnational Justice and Reconciliation: Prerequisite or Burden for Constructive Conflict Transformation?; Part II: Cases; Strategic Nonviolent Action: Waging Constructive Conflict against Authoritarianism; Peaceful Separation: The Politics of Constructive Dissolution; Factors for De-Escalation: and a Shift to Constructive Conflict; The State of Constructive Conflict in Northern Ireland; What Is a Constructive Peace Process?: Inclusion in Peace Negotiations; Part III: Practice; Non- Provocative Defense in the Asia-Pacific Region; Global Contexts for Waging Conflicts Constructively.

G.L. Lamborn, Arms of Little Value: The Challenge of Insurgency and Global Instability in the Twenty-First Century (Havertown, PA: Casemate Publishers, 2012), 312 pp., US $ 32.95 [Hardcover], ISBN: 978-1-6120- 0104-3.

Table of Contents: Foreword; Explanatory Note; Preface; Are Wise Counsels Possible in Insurgencies?; How the Other Half Lives; Many Roads to Insurgency; A Peek at Western Strategic Thinking; Neither Karl nor Antoine; Three Cautionary Tales; Root and Stem; Counterinsurgency Conundrum; American Myopia; Wise Counsels at Home; Annex A: San Salvador 2038; Annex B: So-called “Radical Islam; Annex C: Understanding Fanaticism; Annex D: Viet Cong Political Mobilization.

Sean McFate, The New Rules of War: Victory in the Age of Durable Disorder (New York, NY: William Morrow, 2019), pages, $ 29.99 [Hardcover], ISBN: 978-0-0628-4358-6.

Table of Contents: Foreword by Gen. Stanley McChrystal (Ret.); Author’s Note; Strategic Atrophy; Why Do We Get War Wrong; Rule 1: Conventional War Is Dead; Rule 2: Technology Will Not Save Us; Rule 3: There Is No Such Thing as War or Peace – Both Coexist, Always; Rule 4: Hearts and Minds Do Not Matter; Rule 5: The Best Weapons Do Not Fire Bullets; Rule 6: Mercenaries Will Return; Rule 7: New Types of World Powers Will Rule; Rule 8: There Will Be Wars without States; Rule 9: Shadow Wars Will Dominate; Rule 10: Victory Is Fungible; Winning the Future; Annex: The Thirty-Six Ancient Chinese Stratagems for War.

ISSN 2334-3745 82 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Counterterrorism – Intelligence

Erik J. Dahl, Intelligence and Surprise Attack: Failure and Success from Pearl Harbor to 9/11 and Beyond (Washington, DC: Georgetown University Press, 2013), 256 pp., US $ 29.95 [Paperback], ISBN: 978-1-5890- 1998-0.

Table of Contents: Introduction: Breaking the First Law of Intelligence Failure; Why Does Intelligence Fail, and How Can It Succeed?; Part I: The Problem of Conventional Surprise Attack; Pearl Harbor: Challenging the Conventional Wisdom; The Battle of Midway: Explaining Intelligence Success; Testing the Argument: Classic Cases of Surprise Attack; Part II: The Problem of Terrorist Surprise Attack; the East Africa Embassy Bombings: Disaster Despite Warning; New York City: Preventing a Day of Terror; The 9/11 Attacks: A New Explanation; Testing the Argument: Why Do Terrorist Plots Fail?; Conclusion: Preventing Surprise Attacks Today; Appendix: Unsuccessful Plots and Attacks against American Targets, 1987-2012.

Cynthia Grabo with Jan Goldman, Handbook of Warning Intelligence: Complete and Declassified Edition (Lanham, MD: Rowman & Littlefield, 2015), 454 pp., US $ 100.00 [Hardcover], US $ 61.00 [Paperback], ISBN: 978-1-4422-4813-7.

Table of Contents: Foreword; foreword to the Previous Edition; Author’s Note to the Original Edition; Part I: Why Warning Intelligence and what is it? Some Fundamentals; General Nature of the Problem; Definitions of Terms and Their Usage; What Warning is and is not; Warning and Collection; Intentions versus Capabilities; Part II: Organization and Tools of the Trade; Problems of Organization and Management; Indicator lists; The Compiling of Indications; Can Computers Help?; Part III: Introduction to the Analytical Method; Some Fundamentals of Indications Analysis; Some Specifics of the Analytical Method; What Makes a Good Warning Analyst?; Part IV: Specific Problems of Military Analysis; Importance of Military Indications; Order-of- Battle Analysis in Crisis Situations; Analysis of Mobilization; Logistics is the Queen of Battles; Other Factors in Combat Preparations; Coping with Extraordinary Military Developments; Part V: Specific Problems of Political, Civil and Economic Analysis; Importance of Political Factors for Warning; Basic Political Warning - A Problem of Perception; Some Specific Factors in Political Warning; Economic Indicators; Civil Defense; Security, Counter-Intelligence and Agent Preparations; Part VI: Some Major Analytical Problems; Warning from the Totality of Evidence; The Impact on Warning of Circumstances Leading to War; Reconstructing the Enemy’s Decision Making Process; Assessing the Timing of Attack: Deception: Can We Cope With It?; Part VII: Problems of Particular Types Of Warfare; Analysis with Hostilities already in Progress; Problems Peculiar to Guerrilla Warfare and “Wars of Liberation”; Hypothetical Problems of the Coming of World War III; Part VIII: Reaching and Reporting the Warning Judgment; Vital Importance of the Judgment; What Does the Policy Maker Need, and Want to Know?; How to Write Indications or Warning Items; Assessing Probabilities; Some Major Factors Influencing Judgments and Reporting; Most Frequent Errors in the Judgment and Reporting Process; Part IX: Conclusions; A Summing Up, With Some Do’s and Don’ts for Analysts and Supervisors.

James M. Olson, To Catch a Spy: The Art of (Washington, DC: Georgetown University Press, 2019), 248 pp., $ 29.95 [Hardcover], ISBN: 978-1-6261-6680-6.

Table of Contents: Introduction; China; Russia; Cuba; The Ten Commandments of Counterintelligence; Workplace Counterintelligence; Double-Agent Operations; Managing Double-Agent Operations; Counterintelligence Case Studies (Clayton Lonetree, Sharon Scranage, Clyde Lee Conrad, , Chi Mak, Ana Montes, , , Glenn Michael Souther, Jonathan Pollard, , Larry Wu-Tai Chin); Conclusion; Appendix: The Counterintelligence Officer’s Bookshelf.

ISSN 2334-3745 83 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Hank Prunckun, Methods of Inquiry for Intelligence Analysis [Third Edition] (Lanham, MD: Rowman & Littlefield, 2019], 248 pp., US $ 98.00 [Hardcover], US $ 49.00 [Paperback], ISBN: 978-1-5381-2587-8.

Table of Contents: Foreword; Preface; Intelligence Theory; Intelligence Organizational Structures; The Intelligence Research Process; Clandestine and Covert Sources of Information; Open Sources of Information; Qualitative Analytics; Quantitative Analytics; Geointelligence; Target Profiles; Operational Assessments; Vehicle Route Security Report; Threat Assessments; Vulnerability Assessments; Risk Assessments; National Security Policy Assessments; Appendix: Critical Values of Chi-Square Distribution.

Glenmore S. Trenear-Harvey, Historical Dictionary of Intelligence Failures (Lanham, MD: Rowman & Littlefield, 2015), 324 pp., US $ 116.00 [Hardcover], ISBN: 978-1-4422-3273-0.

Table of Contents: Editor’s Foreword; Preface; Acronyms and Abbreviations; Chronology; Introduction; THE DICTIONARY; Appendix A: Misreading Intentions; Bibliography.

United States, Department of the Army, U.S. Army Counterintelligence Handbooks (New York, NY: Skyhorse Publishing, 2013), 296 pp., US $ 14.95 [Paperback], ISBN: 978-1-6208-7478-3.

Table of Contents: Preface; Mission and Structure (General, Mission, CI in Support of Force XXI, Intelligence Tasks, CI Tasks, Army CT as a Function of MI, Counterreconnaissance, Other Specialties, Peace, War, and OOTW, The CI Structure, CI Support to US Forces, Planning, Tasking and Reporting, Joint and Combined Operations, Legal Review); Investigations (General, Types of Investigations); Operations and Techniques (General, Operations, Techniques); Counterintelligence Collection Activities (General, Control of Source Information, CI Liaison, Debriefing, CI Force Protection Source Operations); Counterintelligence Analysis and Production (General, CI Analysis, Analysis Target Nominations, Analytic Products); Appendix A: Counter-Human Intelligence Techniques and Procedures (Section I. Basic Investigative Techniques and Procedures; Section II: Investigative Legal Principles; Section III: Technical Investigative Techniques; Section IV: Screening, Cordon, and Search Operations; Section V: Personalities, Organizations and Installations List; Section VI: Counter-Human Intelligence Analysis; Section VII: Personnel Security Investigations; Section VIII: Counterintelligence Investigations); Appendix B: Counter-Signals Intelligence Techniques and Procedures (Section I: Database; Section II: Threat Assessment; Section III: Vulnerability Assessment; Section IV: Countermeasures Options Development; Section V: Countermeasures Evaluation); Appendix C: Counter- Imagery Intelligence Techniques and Procedures; Glossary; References.

Counterterrorism – Legal

Fatemah Alzubairi, Colonialism, Neo-Colonialism, and Anti-Terrorism Law in the Arab World (New York, NY: Cambridge University Press, 2019), 284 pp., US $ 110.00 [Hardcover], US $ [Paperback], ISBN: 978-1- 1087-0176-1.

Table of Contents: Introduction; On Imperialism, Colonialism, and Neo-Colonialism; Terrorism and Counter- Terrorism at the International Level: A Challenge in the Postcolonial World; Terrorism and Counter-Terrorism in the Arab World; The Colonial and Neo-Colonial Experience in Egypt; Counter-Terrorism in Egypt; The Colonial and Neo-Colonial Experience in Tunisia; Counter-Terrorism in Tunisia; Conclusion; Appendix I: Egyptian Anti-Terrorism Law No. 94 of 2015; Appendix II: Tunisian Law No 26 of 2015 regarding Anti- terrorism and Money-laundering.

ISSN 2334-3745 84 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Jayson S. Lamchek, Human Rights-Compliant Counterterrorism: Myth-Making and Reality in the Philippines and Indonesia (New York, NY: Cambridge University Press, 2019), 306 pp., US $ 110.00 [Hardcover], ISBN: 978-1-1084-9233-1

Table of Contents: Introduction; Human Rights-Compliant Counterterrorism: Emergence and Consequences; Part I: Philippines; Counterinsurgency and the ‘War on Terror’ in the Philippines; Promoting Human Rights While Rejecting Counterterrorism: Three Filipino Campaigns; The Anti-Extrajudicial Killings Campaign and the Government’s Response: Failed Remedy, Changed Rhetoric, Continuing Practice; Part II: Indonesia; Indonesian Terrorism Discourse From Suharto to Bali; Indonesia’s Legalised Counterterrorism and Divergent Domestic Reactions; The Post-Bali Legacy: Densus 88 and Impunity for Extrajudicial Killings; Conclusion.

J. Jeremy Wisnewski (Ed.), Torture, Terrorism, and the Use of Violence [Review Journal of Political Philosophy, Volume 6, Issue Number 1] (Newcastle upon Tyne, England, UK: Cambridge Scholars Publishing, 2008), 180 pp., US $ 50.95 [Paperback], ISBN: 978-1-8471-8831-1.

Table of Contents: A Typology of Terrorism; Why the End of Liberation Cannot Justify Terrorism as Means: A Sartrean Analysis; Torture and Moral Knowledge; The Senses of Terrorism; Must Terrorism be Violent?; Which Rules: Terrorism as Expanding the Social Space of Battle; The Ethics of Terror and Torture; Waterboarding, Torture, and Violence: Normative Definitions and the Burden of Proof; Acts of Self-Harming Protest and the Definition of Terrorism.

J. Jeremy Wisnewski (Ed.), Torture, Terrorism, and the Use of Violence [Review Journal of Political Philosophy Volume 6, Issue Number 2] (Newcastle upon Tyne, England, UK: Cambridge Scholars Publishing, 2008), 190 pp., US $ 21.95 [Paperback], ISBN: 978-1-4438-0023-5.

Table of Contents: Just War Theory and Selective Conscientious Objection; [Un]feeling: Embodied Violence and Dismemberment in the Development of Ethical Relations; The Annihilative Potential of Immortality Beliefs: Examining Immortality’s Interconnections with Violence; Gerald Dworkin and the Permissibility of Pro-active Law Enforcement Techniques; Upholding the Law of All the Greeks: Lessons on Humanitarian Intervention from Euripides; Philosophy and Disaster; On Executing Executioners; Speaking Power to Truth: Female Suicide Bombers and the Gendering of Violence.

Africa

Mario J. Azevedo and Samuel Decalo, Historical Dictionary of Chad [Fourth Edition] (Lanham, MD: Rowman & Littlefield, 2018), 766 pp., US $ 165.00 [Hardcover], ISBN: 978-1-5381-1436-0.

Table of Contents: Editor’s Foreword; Preface; Map; Acronyms and Abbreviations; Chronology; Introduction; THE DICTIONARY; Appendices; Bibliography.

Nick Ridley, Terrorism in East and West Africa (Northampton, MA: Edward Elgar, 2015), 240 pp., US $ 110.70 [Hardcover], ISBN: 978-1-7834-7051-8.

Table of Contents: Preface; Bin Laden’s Starting Point; 9/11, Reaction and a Wave of Global Terrorism; East Africa, Terrorism and Counter-measures; Turbulence in – and in Kenya; The Horn of Africa; Terrorism in West Africa; Mali – the Second Decade Catalyst; Mali – Intelligence Lessons Learned?; The ‘Rise’ of Piracy; Conclusion.

ISSN 2334-3745 85 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Usman A. Tar and Bashir Hala (Eds.), New Architecture of Regional Security in Africa: Perspectives on Counter-Terrorism and Counter-Insurgency in the Lake Chad Basin (Lanham, MD: Lexington Books, 2020), pp., US $ [Hardcover], ISBN: 978-1-4985-7410-5.

Table of Contents: Part I: Conceptual and Contextual Perspectives; Introduction: Lake Chad Basin - Africa’s Emerging Regional Security Complex; Theoretical Perspectives on Terrorism and Insurgency in Africa; The Frontiers of Counter Terrorism and Counter Insurgency in the Lake Chad Basin; Part II: Transnational Perspectives; Mapping Counter-Terrorism and Counter-Insurgency (CT-COIN) in Africa; Multilateral Organizations, Counter-Terrorism and Counter-Insurgency in the Lake Chad Basin; Part III: Regional Perspectives; The Ecology and Geopolitics of Lake Chad Basin; Lake Chad Basin Commission: Emerging Framework for Security Regionalization in the Lake Chad Basin; Emerging Architecture for Regional Security Complex in the Lake Chad Basin: The Multinational Joint Task Force in Perspective; Policing Counterterrorism and Counterinsurgency in the Lake Chad Basin; Intelligence Capabilities, Counter- Terrorism and Counter-Insurgency in the Lake Chad Basin; Part IV: National and Local Perspectives; Ground Zero: Islamic Radicalization and Insurgency in Northeast Nigeria; The Ecology of Insurgency and Counter-Insurgency: Environmental Security in North-Eastern Nigeria; Special Operations Forces, Counter Terrorism and Counter Insurgency Operations in the Lake Chad Area: The Nigerian Experience; Cameroon: Counterterrorism and Counter Insurgency in a Volatile Neighborhood; Niger Republic: Niger Republic: Counter-Terrorism and Counter-Insurgency in a Complex Terrain; Part V: Alternative Perspectives; Civil Society, Counter-Terrorism and Counter-Insurgency in the Lake Chad Basin; Religious Institutions, Counter- Terrorism and Counter-Insurgency in Lake Chad Basin; Gender, Vulnerability and Counterterrorism in the Lake Chad Basin: Impact on Women and Children in North East Nigeria; Civilians, Counterterrorism and Counterinsurgency in the Lake Chad Basin; Youth Bulge, Radicalization and Deradicalization in the Lake Chad Basin; Humanitarian Agencies, Counter-Terrorism and Counter-Insurgency in the Lake Chad Basin; Part VI: Conclusion: The Prospects of Counter-Terrorism and Counter-Insurgency in the Lake Chad Basin.

Algeria

Phillip C. Naylor, Historical Dictionary of Algeria [Fourth Edition] (Lanham, MD: Rowman & Littlefield, 2015), 738 pp., US $ 183.00 [Hardcover], ISBN: 978-0-8108-7918-8.

Table of Contents: Editor’s Foreword; Reader’s Notes; Acronyms and Abbreviations; Maps; Chronology; Introduction; THE DICTIONARY; Appendix A: French Governors in Colonial Algeria; Appendix B: Revolutionary Organizations and National Governments; Appendix C: Selected Name Changes since Independence; Appendix D: Tables; Glossary; Bibliography.

Israel

Yossi Alpher, No End of Conflict: Rethinking Israel-Palestine (Lanham, MD; Rowman & Littlefield, 2016), 178 pp., US $ 40.00 [Hardcover], ISBN: 978-1-4422-5858-7.

Table of Contents: Preface; Introduction; Maps; , or the Arab-Jewish Divide; Part I: Contemporary Israel; After nearly 50 Years of Occupation: How the World Increasingly sees Israel; The Emerging Social- Political-Demographic Challenge to Israeli Internal Cohesion; The Global Jewish Factor: The Diaspora, Anti- Semitism; The Region: Dealing With a Bad Neighborhood; Resolving the Palestinian Issue, 1936 to 2009: A Dynamic of Failure; Lessons from Kerry’s Failure and the American Role; Part II: Israel Tomorrow; Are There Alternative Ways to Muddle Through?; On the Slippery Slope toward a Bi-National Israel; Summarizing the Strategic Ramifications of the Quasi-Apartheid Schemes; Are There Radical Alternative Realities?

ISSN 2334-3745 86 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Gershon Baskin, In Pursuit of Peace in Israel and Palestine (Nashville, TN: Vanderbilt University Press, 2017), 304 pp., US $ 27.95 [Hardcover], ISBN: 978-0-8265-2181-1.

Table of Contents: Preface; Is Israel-Arab Peace Even Possible?; Why Write This Book?; In the Beginning; Making Aliya to an Arab Village; Working for the Israeli Government; The Institute for Education for Jewish Arab Coexistence; The Israeli Army Drafts Me; The First Engagement – The Intifada; Inventing IPCRI; A Day in the Life of an Israeli Peace Activist; Becoming a Security Threat; The Magical Kingdom; From Security List to Advisor to the Prime Minister; Bringing Security to the Table; The al-Aqsa Intifada, September 2000; Dilemmas of a Peacemaker; Near Death Experiences; Making Peace; Lessons Learned; Why the Kerry Initiative Failed; A Plan to Replace the Netanyahu Government; Netanyahu Wins, Hands Down; Where to from Here?; What Does Peace Look Like?; Final Thoughts.

Raffaella A. Del Sarto, Israel Under Siege: The Politics of Insecurity and the Rise of the Israeli Neo-Revisionist Right (Washington, DC: Georgetown University Press, 2017), 296 pp., US $ 98.95 [Hardcover], US $ 32.95 [Paperback], ISBN: 978-1-6261-6407-9.

Table of Contents: Preface; Introduction: Israel’s New Foreign Policy Consensus after the Oslo Peace Process, 2000-2010; Feeling under Siege: Conflicts, Threats, and Regional Order; Israel’s Foreign Policy Consensus: Impact and Implications; A New Domestic Hegemony: Factors and Explanations; The Return of Dissent? 2010 to the Present; Conclusion: Insecurity and the Power of Neo-Revisionist Hegemony; Appendix A: Key Political Figures; Appendix B: Chronology.

Ehud Eilam, Israel’s Military Doctrine (Lanham, MD: Lexington Books, 2018), 174 pp., US $ 90.00 [Hardcover], ISBN: 978-1-4985-7563-8.

Table of Contents: Preface; Introduction; Israel, Arabs and Iran; Israel’s National Security Policy; Doctrine and Buildup; The New Threat in the Skies; Air-Ground Operations; Ground Forces; Operational Factors; Offense vs. Defense; The Dilemma between Defense in Depth and Forward Defense; Infrastructure; The Troops; Conclusion.

Robert O. Freedman (Ed.), Israel Under Netanyahu: Domestic Politics and Foreign Policy (New York, NY: Routledge, 2020), 318 pp., US $ 150.00 [Hardcover], US $ 39.95 [Paperback], ISBN: 978-0-3673-5876-1.

Table of Contents: Introduction; Part I. Israeli Domestic Politics; Israel’s Likud Party; The Zionist Union, Yesh Atid and Meretz Opposition; The Israel is our Home Party; Israel’s Religious Parties; Netanyahu’s Policy Toward Israel’s Arab Sector; The Israeli Economy under Netanyahu;Part II. Israeli Foreign Policy; Israel and the United States; Israel and the American Jewish Community; Israel, the and the Arab World; Israel and Iran; The Rise and Fall of the Turkish-Israeli Alliance; Israel’s Pivot from Europe to Asia; Israel and Russia; Israel and Counterterrorism; Epilogue; Annex One: Israeli Election Results, 2009; Annex Two: Israeli Election Results, 2013; Annex Three, Israeli Election Results, 2015; Annex Four: Israeli Election Results, April 2019; Israeli Election Results, September 2019.

Bernard Reich and David H. Goldberg, Historical Dictionary of Israel [Third Edition] (Lanham, MD: Rowman & Littlefield, 2016), 780 pp., US $ 182.00 [Hardcover], ISBN: 978-1-4422-7184-5.

Table of Contents: Editor’s Foreword; Preface; Acronyms and Abbreviations; Chronology; Introduction; THE DICTIONARY; Appendix A: Declaration of the Establishment of the State of Israel; Appendix B: Leaders, Governments, and Population; Bibliography (Introduction; General Works about Israel; Directories, Yearbooks, ISSN 2334-3745 87 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Encyclopedias, and Dictionaries; Autobiographies, Biographies, and Memoirs; Defense and Security; Economy; Government and Politics; History; International Relations; ; Society; Zionism, Anti-Zionism and “New” Anti-Semitism; Internet Resources).

David Rodman, Combined Arms Warfare in Israeli Military History: From the War of Independence to Operation Protective Edge (Chicago, IL: Sussex Academic Press, 2019), 172 pp., $ 50.00 [Hardcover], US $ 34.95 [Paperback], ISBN: 978-1-8451-9967-8.

Table of Contents: List of Abbreviations; List of Illustrations; Preface; Introduction: the Essence of Combined Arms Warfare; The War of Independence and the Sinai Campaign: Combined Arms Warfare in Its Infancy; The Six-Day War: Combined Arms Warfare Comes of Age; The War of Attrition: Combined Arms Warfare Takes a Back Seat; The War: Combined Arms Warfare Takes a Licking but Keeps on Ticking; The Lebanon War: Combined Arms Warfare Reinvigorated; The Second Lebanon and Gaza Wars: Combined Arms Warfare and Asymmetrical War; Between Wars: Combined Arms Warfare and Low-intensity Conflict; “In Time of Peace, Conflict, or War”: Combined Arms Warfare and Special Operations; Conclusion: The Benefits of Combined Arms Warfare; Glossary of Technical Terms.

Aryeh Shalev, Israel’s Intelligence Assessment Before the Yom Kippur War: Disentangling Deception and Distraction (Chicago, IL: Sussex Academic Press, 2014), 297 pp., $ 115.00 [Hardcover], $ 42.95 [Paperback], ISBN: 978-1-8451-9636-3.

Table of Contents: Preface; Introduction; Part I: Israel’s Security Concept and the Intelligence Concept; Israel’s Security Concept and its Limitations; The Intelligence Concept; Part II: Arab Military Preparations for War through the Intelligence Prism; Basic Intelligence; Formulating the Intelligence Picture; The Essence of Warning; Part III: Intelligence Assessments and the Decision Makers; Is Egypt Starting a War?; Warning from a Particular High Placed Source; Assessment of Readiness and Assessment of Intentions; Meetings with the Prime Minister, the Defense Minister, and the Chief of the General Staff;Part IV: The Mistakes and the Failures; Intelligence’s Mistaken Assessment; The Reasons for the Intelligence Failure;Part V: The Difficulties of Intelligence Work; Basic Issues in the Intelligence Branch; Problems with the Intelligence Assessment before the Yom Kippur War; Part VI: Proposed Lessons; Responsibility for Assessment of Intentions: The Role of the Leadership; Organizational Lessons; Lessons on Working Methods; Conclusion; Appendix A: Israel and the Arab States: Important Dates between the Six Day War and the Yom Kippur War; Appendix B: Intelligence Products in the Period before the Yom Kippur War; Appendix C: Emerging Lessons in a Meeting with the 244 Intelligence Branch Director one Month after the Outbreak of the War; Appendix D: Personal Letter from Intelligence Branch Director Major General Aharon Yariv to the Author, 27 September 1972; Appendix E: Letter in Praise of this Book by Lieutenant General (ret.) Moshe Yaalon, while Serving as Chief of General Staff.

Northern Ireland

William Matchett, Secret Victory: The Intelligence War That Beat the IRA (Belfast, Northern Ireland, United Kingdom: Matchett, 2016), 272 pp., US $ 16.95 [Paperback], ISBN: 978-1-5272-0205-4.

Table of Contents: Introduction; Loughgall: The Inside Story; The Troubles; Licence to Kill; Provo Strongholds; Nothing New; British Made in Ireland; Agents & Handlers; Barbed Wire and Bayonets; Shock and Awe; Knowledge and Empathy; Super Sleuths and Supergrasses; Without Fear or Favour; Quality not Quantity; Red-Handed; Clever Cops; Deadly Covert Ops; A Rigged Game; Al-Qaeda and the IRA.

ISSN 2334-3745 88 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

United States

Mark F. Cancian, Tell Me How This Ends: Military Advice, Strategic Goals, and the “Forever War” in Afghanistan (Lanham, MD: Rowman & Littlefield/Center for Strategic & International Studies, 2019), 56 pp., US $ 45.00 [Paperback] ISBN: 978-1-4422-8125-7.

Table of Contents: Executive Summary; Introduction – 18 Years of Unexpected War; Why It Matters – High Costs and Unsatisfactory Outcome (Down from Peak Intensity but Still Going; After 18 Years a Stalemate…at Best; Long Wars Are Not a U.S. Strength; it’s Not All Bad; Were the Benefits worth the Cost?); End States drive the Military Effort (Limited Initial Objectives, The 2002-2004 Shift, When “No Nation-Building” Is Nation- Building, A Classic Case of Mission Creep, A Shift to Help Peace Negotiations?, Using Military Forces for Nation-Building, Political and Cultural Transformation Is a Multi-Generational Effort, The Void in Military Doctrine FM-3-24 Insurgencies and Countering Insurgencies and Other Joint Publications, Is There Any Real Choice About End States?); The Effect of Nation-Building on Military Advice (A long War but No Timeline, Continuing Requests for More Troops, Repeated Statements About Progress); Superpower Hubris – This Time Will Be Different (Ignoring How Others May See Us, Ignoring the Soviet Experience, Ignoring the History of Occupation, Ignoring the History of Afghanistan, Ignoring Why the Taliban Fight); Should the Military Be Offering Strategic Advice About Goals and End States; Recommendations – Eyes Wide Open (Create A Dialogue Between Senior Military and Civilian Leaders About Goals and End States, Require More Clarity from Civilian Officials: Update AUMFs, Continue to Develop Military Strategies, Take Seriously the History and Experience of Others, Revise Doctrine Manuals to Include a Discussion of End States).

Joana Cook, A Woman’s Place: US Counterterrorism Since 9/11 (New York, NY: Oxford University Press, 2020), 304 pp., US $ 49.95 [Hardcover], ISBN: 978-0-1975-0655-4.

Table of Contents: Introduction: Women as agents, partners and targets of counterterrorism; Analyzing women in counterterrorism; Counterterrorism from Bush to Obama; The Department of Defense; The Department of State; The US Agency for International Development; Enter Trump: Counterterrorism Going Forward; Appendix: Examples highlighted throughout the book.

Derick L. Hulme Jr., The Domestic Politics of Terrorism: Lessons from the Clinton Administration (Lanham, MD: Lexington Books, 2020), 268 pp., US $ 95.00 [Hardcover], ISBN: 978-1-7936-0998-4.

Table of Contents: Preface; The Domestic Politics of Terrorism; the World Trade Center Bombing; The Oklahoma City Bombing; The Khobar Towers and Atlanta Olympics Bombings; The African Embassy Bombings; The U.S.S. Cole Bombing; Terrorism and the Clinton Presidency; Lessons.

Jeannie L. Johnson, The Marines Counterinsurgency and Strategic Culture: Lessons Learned and Lots in America’s Wars (Washington, DC: Georgetown University Press, 2018), 320 pp., US $ 110.95 [Hardcover], $ 36.54 [Paperback], ISBN: 978-1-6261-6556-4.

Table of Contents: Foreword by USMC General (Ret.) Jim Mattis; Introduction: Learning Counterinsurgency; Part I: The Strategic Cultures of Americans, the US Military, and Marines; Know Thyself: Turning the Strategic Culture Tool Forward; Rounding the Possible: The Impact of US National and Military Cultures on Counterinsurgency Practice; Life in the Seams: Establishing Marine Corps Identity and Role; Brothers in Arms: Marine Norms and Values; “We Do Windows”: Marine Norms and Perceptual Lens; Part II: Marines Across a Century of Counterinsurgency Practice; Setting the Stage: Small Wars and the American Mind; Contrasting Nation-Building in the Caribbean and Vietnam: Efficiency and Order as Enemies of Democracy; Counterinsurgency Readiness from Haiti to Vietnam: The Consequences of Craving Conventional War;

ISSN 2334-3745 89 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Counterinsurgency in Iraq: Experiencing the Learning Curve; Conclusion: Lessons Learned and Lessons Lost.

Peter R. Neumann, Bluster: Donald Trump’s War on Terror (New York, NY: Oxford University Press, 2019), 160 pp., US $ 21.95 [Hardcover], ISBN: 978-0-1900-9994-7.

Table of Contents: Introduction: Argument; The Trump Doctrine: Before Trump, Killing Terrorists, Keeping Muslims Out; The Campaign: Outrage, Enemies Within, “Snakes,” Respect; Policy and People: Policy, People; Banning Muslims: The Travel Ban, Extreme Vetting; Rules of Engagement: Change, Continuity, Consequences; Defeating ISIS: Obama’s War, The Generals War, Trump’s War; Friends and Foes: Deals, Outsourcing, Strongmen; Homeland: Prosecuting Jihadists, “Terrorism Prevention,” Right Turn, Impact; Conclusion: Ignorance, Idiosyncrasy, Ideology.

Don Philpott, IS America Safe? Terrorism, Homeland Security, and Emergency Preparedness [Second Edition] (Lanham, MD: Bernan Press, 2019), 440 pp., US $ 44.00 [Paperback], ISBN: 978-1-6414-3307-5.

Table of Contents: Introduction; Part I: Terrorism Today; Twenty-First Century Threats to the Homeland; Counterterrorism Tactics; Are We Winning the War? Foreign Terrorist Organizations; Part II: A History of Terrorism; America’s Birth: A Heritage of Conflict and Terror; ; International Terrorism; The Spread of Global Terrorism;Part III: Be Prepared; Preparing for and Coping with a Disaster; Staying Safe at School, Work, and Play; Resources.

Jennifer Morrison Taw, Mission Revolution: The U.S. Military and Stability Operations (New York, NY: Columbia University Press, 2012), 280 pp., US $ 80.00 [Hardcover], US $ 28.00 [Paperback], ISBN: 978-0- 2311-5324-9.

Table of Contents: Introduction. Mission Creep Writ Large: The U.S. Military’s Embrace of Stability Operations; Stability Operations in Context: Defining Stability Operations, The History of Stability Operations, Stability Operations Debates, Stability Operations: Unique Requirements, Conclusion; Doctrine and Stability Operations: Stability Operations’ Doctrinal Development, Stability Operations in Post- Doctrine, Stability Operations in Doctrine Today, Full-Spectrum Operations, FM 3-24, Counterinsurgency, and FM 3-07, Stability Operations, A Brief Observation: SOF and Stability Operations Doctrine, Conclusion; Practical Adjustments to Achieve Doctrinal Requirements: Force Structure, Training and Education, Procurement, Stability Operations’ Equipment Requirements, Conclusion; Explaining the Military’s Mission Revolution: Securitized Instability; Institutional Privileging, The Military’s Embrace of Stability Operations; Implications of Mission Revolution: Peacetime Extension: GCCs, Fill-the-Gap Operations: Iraq and Afghanistan, COIN: A Microcosm, Conclusion; A New World Order.

David Tucker and Christopher J. Lamb, United States Special Operations Forces [Second Edition] (New York, NY: Columbia University Press, 2020), 376 pp., $ 105.00 [Hardcover], $ 34.75 [Paperback], ISBN: 978-0-2311- 8389-5.

Table of Contents: Introduction: American Special Operations Forces; Part I: The American Experience with Special Operations Forces; Special Operations Forces and Modern Warfare; History; Part II: Selected Case Studies; Somalia; High-Value Target Teams; Village Stability Operations; Part III: Special Operations Forces and U.S. National Security Policy; Special Operations Forces Roles and Missions; Special Operations Forces and the Future of Warfare; Conclusion: The Strategic Utility of American Special Operations Forces; Appendix 1: The Evolution of Special Operations Forces Roles and Missions; Appendix 2: Bibliographic Essay.

ISSN 2334-3745 90 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

United States, Office of the Secretary of Defense Vietnam Task Force, The Pentagon Papers: The Secret History of the Vietnam War [Reprint Edition] (New York, NY: Racehorse Publishing, 1971/2017), 848 pp., US $ 17.99 [Paperback], ISBN: 978-1-6315-8293-6.

Table of Contents: Foreword; Introduction; The Truman and Eisenhower Years: 1945-1960; Origins of the Insurgency in South Vietnam; The Kennedy Years 1961-1963; The Overthrow of Ngo Dinh Diem: May- November, 1963; The Covert War and Tonkin Gulf: February-August, 1964; The Consensus to Bomb North Vietnam: August, 1964-February 1965; The Launching of the Ground War: March-July, 1965; The Buildup: July, 1965-September, 1966; Secretary McNamara’s Disenchantment: October, 1966-May, 1967; The Tet Offensive and the Turnaround; Appendix 1: Analysis and Comment: The Lessons of Vietnam; Appendix 2: Court Records (U.S. v. New York Times Company, et al; U.S. v. Company, et al; Oral Argument Before the Supreme Court, Decision and Opinions); Appendix 3: Biographies of Key Figures; Index of Key Documents; Glossary.

Ibrahim Warde, The Price of Fear: The Truth Behind the Financial War on Terror (Oakland, CA: University of California Press, 2008), 288 pp., US $ 26.95 [Paperback], ISBN: 978-0-5202-5815-0.

Table of Contents: Introduction: The Fog of Financial War; Part I: The Mythology of Terrorist Financing; Fantasy, Fiction, and Terrorism Financing; Part II: Rules of Financial Engagement; Framing the Guilty: The Financial Terrain; The Flawed Money Laundering Template; Part III: Narrative and Dynamics; Money and the War on Terror Narrative; The Usual Suspects; Dynamics of the Financial War; Part IV: War and Consequences; Targets and Collateral Damage; “Gated Finance” and Other Contradictions of the Financial War; The Question of Islamic Charities; Part V: Assessments and Recommendations; “Catastrophic Successes”: Assessing the Financial War; Rethinking Money and Terror; Epilogue: The Last Happy Warriors.

About the Reviewer: Dr. Joshua Sinai is the Book Reviews Editor of ‘Perspectives on Terrorism’. He can be reached at: [email protected].

ISSN 2334-3745 91 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Bibliography: Deradicalization Compiled and selected by Judith Tinnes [Bibliographic Series of Perspectives on Terrorism – BSPT-JT-2020-1]

Abstract This bibliography contains journal articles, book chapters, books, edited volumes, theses, grey literature, bibliogra- phies and other resources on deradicalization. It focuses on recent publications (up to January 2020) and should not be considered as exhaustive. The literature has been retrieved by manually browsing more than 200 core and periphery sources in the field of Terrorism Studies. Additionally, full-text and reference retrieval systems have been employed to broaden the search. Keywords: bibliography, resources, literature, deradicalization, counter-radicalization, methods, programs NB: All websites were last visited on 18.01.2020. - See also Note for the Reader at the end of this literature list.

Bibliographies and other Resources Centre for the Prevention of Radicalization Leading to Violence (CPRLV) (2015, March-). URL: https://in- fo-radical.org/en Department of Homeland Security (DHS) Science and Technology Directorate (S&T) (2018): Terrorism Pre- vention Literature Library. URL: https://www.dhs.gov/science-and-technology/accessing-terrorism-preven- tion-literature-library European Eye on Radicalization (EER) (n.d.): Radicalization and Deradicalization Bibliography. URL: https:// eeradicalization.com/bibilographies/#1547464178047-5448dd14-2ca8 German Institute on Radicalization and De-radicalization Studies (GIRDS) (2014-).URL: http://girds.org Hofmann, David C. (2012, December): Review Essay: Twenty Important Journal Articles on Radicalisation to, and De-Radicalisation from, Terrorism. Perspectives on Terrorism, 6(6), 104-113. URL: https://www.universite- itleiden.nl/binaries/content/assets/customsites/perspectives-on-terrorism/2012/issue-6/review-essay.pdf Hofmann, David C.; Schmid, Alex P. (2012, December): Selected Literature on (i) Radicalization and Recruit- ment, (ii) De-Radicalization and Dis-Engagement, and (iii) Counter-Radicalization and Countering Violent Extremism. Perspectives on Terrorism, 6(6), 114-143. URL: https://www.universiteitleiden.nl/binaries/content/ assets/customsites/perspectives-on-terrorism/2012/issue-6/selected-literature-on-radicalization-and-recruit- ment-de-radicalization-and-dis-engagement...---hofmann-and-schmid.pdf Huet, Esther et al. (2018, January): Bibliographie « radicalisation » et « terrorisme ». Radicalisations. URL: https://radical.hypotheses.org/files/2017/10/Biblio_radicalisation_09012018.pdf Köhler, Daniel; Hutzel, Christine (Eds.-in-Chief) (2014, Winter-): Journal for Deradicalization (JD). [ISSN: 2363-9849]. URL: http://journals.sfu.ca/jd Kompetenznetzwerk Radikalisierungsprävention (2017-). URL: https://www.netzwerk-deradikalisierung.com Kompetenzzentrum gegen Extremismus in Baden-Württemberg (konex) (2015-). URL: https://www.kon- ex-bw.de Pawella, Jeanne (2016, April-): Dispositifs et rapports sur la radicalisation. Radicalisations. URL: https://radi- cal.hypotheses.org/681

ISSN 2334-3745 92 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Price, Eric; Schmid, Alex P. (2010, May): Selected Literature on Radicalization and De-Radicalization from Terrorism. Perspectives on Terrorism, 4(2), 58-76. URL: https://www.universiteitleiden.nl/binaries/content/ assets/customsites/perspectives-on-terrorism/2010/issue-2/selected-literature-on-radicalization-and-de-radi- calization-from-terrorism-eric-price-and-alex-scmihd.pdf Schmid, Alex P.; Price, Eric (2011, May): Selected Literature on Radicalization and De-Radicalization of Ter- rorists: Monographs, Edited Volumes, Grey Literature and Prime Articles Published since the 1960s. Crime, Law and Social Change, 55(4), 337-348. DOI: https://doi.org/10.1007/s10611-011-9287-4 URL: https://www. ssoar.info/ssoar/bitstream/handle/document/28667/ssoar-clsc-2011-4-schmid_et_al-selected_literature_on_ radicalization_and.pdf Tinnes, Judith (2019, December): Bibliography: Terrorism Prevention. Perspectives on Terrorism, 13(6), 116- 166. URL: https://www.universiteitleiden.nl/binaries/content/assets/customsites/perspectives-on-terror- ism/2019/issue-6/10-tinnes.pdf Wagner, Bernd (Ed.-in-Chief) (2013-): Journal EXIT-Deutschland (JEX): Journal for Deradicalization and Democratic Culture. [ISSN: 2196-8136]. URL: http://journals.sfu.ca/jed Youth Empowerment and Innovation Project (YEIP) (2017, December): Young, Marginalised but not Radical- ised: A Comparative Study of Positive Approaches to Youth Radicalisation: Bibliography. [6 Languages]. URL: https://yeip.org/2017/11/30/bibliography-on-youth-radicalisation-in-6-languages-released-by-yeip .

Books and Edited Volumes Ahmed, Kawser; Belanger, Patrick; Szmania, Susan (Eds.) (2018): Community-Focused Counter-Radicalization and Counter-Terrorism Projects: Experience and Lessons Learned. Lanham: Lexington Books. Alimi, Eitan Y.; Demetriou, Chares; Bosi, Lorenzo; (2015): The Dynamics of Radicalization: A Relational and Comparative Perspective. New York: Oxford University Press. Angell, Ami; Gunaratna, Rohan (2012): Terrorist Rehabilitation: The U.S. Experience in Iraq. Boca Raton: CRC Press. Ashour, Omar (2009): The De-Radicalization of Jihadists: Transforming Armed Islamist Movements. (Contem- porary Terrorism Studies). Abingdon: Routledge. Aslam, Mohd Mizan; Gunaratna, Rohan (Eds.) (2020): Terrorist Rehabilitation and Community Engagement in and Southeast Asia. (Routledge Studies in the Politics of Disorder and Instability). Abingdon: Rout- ledge. Baehr, Dirk (2019): Der Weg in den Jihad: Radikalisierungsursachen von Jihadisten in Deutschland. (Globale Gesellschaft und internationale Beziehungen). Wiesbaden: Springer VS. Baker-Beall, Christopher; Heath-Kelly, Charlotte; Jarvis, Lee (Eds.) (2015): Counter-Radicalisation: Critical Perspectives. (Routledge Critical Terrorism Studies). Abingdon: Routledge. Berger, J. M. (2018): Extremism. (The MIT Press Essential Knowledge Series). Cambridge: MIT Press. Bjørgo, Tore; Horgan, John (Eds.) (2009): Leaving Terrorism Behind: Individual and Collective Disengagement. (Cass Series on Political Violence). Abingdon: Routledge. Braddock, Kurt (in press): Weaponized Words: The Strategic Role of Persuasion in Violent Radicalization and Counter-Radicalization. Cambridge University Press. Clubb, Gordon (2017): Social Movement De-Radicalisation and the Decline of Terrorism: The Morphogenesis of the Irish Republican Movement. (Contemporary Terrorism Studies). Abingdon: Routledge.

ISSN 2334-3745 93 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Colaert, Lore (Ed.) (2017, September): “Deradicalisation”: Scientific Insights for Policy. [e-Book]. Brussels: Flem- ish Peace Institute. URL: https://www.academia.edu/35575218/De-radicalisation_Scientific_insights_for_pol- icy Disley, Emma et al. (2012): Individual Disengagement from Al Qa’ida-Influenced Terrorist Groups: A Rapid Ev- idence Assessment to Inform Policy and Practice in Preventing Terrorism. [e-Book]. (RAND Technical Reports, TR-785-HO). URL: https://www.rand.org/pubs/technical_reports/TR785.html Ebner, Julia (in press): Going Dark: The Secret Social Lives of Extremists. London: Bloomsbury. El-Said, Hamed (2015): New Approaches to Countering Terrorism: Designing and Evaluating Counter Radical- ization and De-Radicalization Programs. (New Security Challenges). Basingstoke: Palgrave Macmillan. El-Said, Hamed; Harrigan, Jane (2012): Deradicalizing Violent Extremists: Counter-Radicalization and Deradi- calization Programs and their Impact in Muslim Majority States. Abingdon: Routledge. Elshimi, M. S. (2017): De-Radicalisation in the UK Prevent Strategy: Security, Identity and Religion. (Routledge Critical Terrorism Studies). Abingdon: Routledge. Fadil, Nadia; de Koning, Martijn; Ragazzi, Francesco (Eds.) (2019): Radicalization in Belgium and the Nether- lands: Critical Perspectives on Violence and Security. (Library of European Studies). London: I.B. Tauris. Glaser, Henning (Ed.) (2017): Talking to the Enemy: Deradicalization and Disengagement of Terrorists. (CPG Series of Comparative Constitutional Law, Politics and Governance, Vol. 4). Baden-Baden: Nomos. Gunaratna, Rohan; Bin Ali, Mohamed (Eds.) (2015): Terrorist Rehabilitation: A New Frontier in Counter-Ter- rorism. (ICP Insurgency & Terrorism Series, Vol. 7). London: Imperial College Press. Gunaratna, Rohan; Hussin, Sabariah (Eds.) (2018): International Case Studies of Terrorist Rehabilitation. (Rout- ledge Studies in the Politics of Disorder and Instability). Abingdon: Routledge. Gunaratna, Rohan; Hussin, Sabariah (Eds.) (2019): Deradicalisation and Terrorist Rehabilitation: A Framework for Policy-Making and Implementation. (Routledge Studies in the Politics of Disorder and Instability). Abing- don: Routledge. Gunaratna, Rohan; Hussin, Sabariah (Eds.) (2020): Terrorist Deradicalisation in Global Contexts: Success, Fail- ure and Continuity. (Routledge Studies in the Politics of Disorder and Instability). Abingdon: Routledge. Gunaratna, Rohan; Jerard, Jolene; Rubin, Lawrence (Eds.) (2011): Terrorist Rehabilitation and Counter-Rad- icalisation: New Approaches to Counter-Terrorism. (Cass Series on Political Violence). Abingdon: Routledge. Hamm, Mark S. (2013): The Spectacular Few: Prisoner Radicalization and the Evolving Terrorist Threat. (Alter- native Criminology). New York: New York University Press. Hansen, Stig Jarle; Lid, Stian (Eds.) (2020): Routledge Handbook of Deradicalisation and Disengagement. (Rout- ledge Handbooks). Abingdon: Routledge. Hikam, Muhammad A. S. (2017): Deradicalization: Engendering Indonesian Civil Society Organizations in Curbing Radicalism. (Leni Achnas, Trans.). Jakarta: Penerbit Buku Kompas. Hofman, Joanna; Sutherland, Alex (Eds.) (2018): Evaluating Interventions that Prevent or Counter Violent Ex- tremism: A Practical Guide. [e-Book]. (RAND Research Reports, RR-2094-EC). Santa Monica: RAND Corpo- ration. DOI: https://doi.org/10.7249/RR2094 Horgan, John (2009): Walking Away from Terrorism: Accounts of Disengagement from Radical and Ex- tremist Movements. Abingdon: Routledge. URL: http://www.book2look.com/book/pCvGNLevIh?utm_ source=shared_link&utm_medium=post&utm_campaign=SBU1_rk_3rf_6sl_2sec_cmg15_x_X Hwang, Julie Chernov (2018): Why Terrorists Quit: The Disengagement of Indonesian Jihadists. Ithaca: Cornell

ISSN 2334-3745 94 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

University Press. Köhler, Daniel (2017): Understanding Deradicalization: Methods, Tools and Programs for Countering Violent Extremism. (Contemporary Terrorism Studies). Abingdon: Routledge. Köhler, Daniel (2017, January): Structural Quality Standards for Work to Intervene with and Counter Violent Extremism: A Handbook for Practitioners, State Coordination Units and Civil Society Programme Implementers in Germany. (English Ed.; British Embassy in Berlin, Trans.). [e-Book]. Stuttgart: Counter Extremism Net- work Coordination Unit (KPEBW), Ministry for Interior Affairs, Digitalisation and Integration of the State of Baden-Württemberg / German Institute on Radicalization and De-Radicalization Studies (GIRDS). URL: http://girds.org/file_download/23/final-handbook-quality-standards.pdf Kruglanski, Arie W.; Bélanger, Jocelyn J.; Gunaratna, Rohan (2019): The Three Pillars of Radicalization: Needs, Narratives, and Networks. New York: Oxford University Press. Kruglanski, Arie W.; Webber, David; Köhler, Daniel (2020): The Radical’s Journey: How German Neo-Nazis Voyaged to the Edge and Back. New York: Oxford University Press. Marsden, V. (2017): Reintegrating Extremists: Deradicalisation and Desistance. London: Palgrave Pivot / Springer Nature. DOI: https://doi.org/10.1057/978-1-137-55019-4 Martin, Thomas (2019):Counter-Radicalisation Policy and the Securing of British Identity: The Politics of Pre- vent. Manchester: Manchester University Press. Mattsson, Christer; Johansson, Thomas (2019):Life Trajectories into and out of Contemporary Neo Nazism: Be- coming and Unbecoming the Hateful Other. (Routledge Research in Race and Ethnicity). Abingdon: Routledge. McGlynn, Catherine; McDaid, Shaun (2019): Radicalisation and Counter-Radicalisation in Higher Education. Bingley: Emerald. Nuri, Maqsudul Hasan; Khan, Rashid Ahmad; Khan, Muhammad Nawaz (2011): De-Radicalization and En- gagement of Youth in Pakistan. Islamabad: Islamabad Policy Research Institute (IPRI) / Hanns Seidel Founda- tion (HSS). Rabasa, Angel et al. (2010): Deradicalizing Islamist Extremists. [e-Book]. (RAND Monographs, MG-1053-SRF). URL: https://www.rand.org/pubs/monographs/MG1053.html Salih, Cale et al. (Eds.) (2018): The Limits of Punishment: Transitional Justice and Violent Extremism. [e-Book]. New York / Barcelona: UNU Centre for Policy Research (UNU-CPR) / Institute for Integrated Transitions (IFIT). URL: https://cpr.unu.edu/the-limits-of-punishment-transitional-justice-and-violent-extremism.html Schmid, Alex P. (Ed.) (forthcoming Fall 2020): Handbook of Terrorism Prevention and Preparedness. The Hague: International Centre for Counter-Terrorism (ICCT). Schmidinger, Thomas (2016):Jihadismus: Ideologie, Prävention und Deradikalisierung. Wien: Mandelbaum. Van Den Bos, Kees (2018): Why People Radicalize: How Unfairness Judgments are Used to Fuel Radical Beliefs, Extremist Behaviors, and Terrorism. New York: Oxford University Press. van Eerten, Jan-Jaap; Doosje, Bertjan (2020): Challenging Extremist Views on Social Media: Developing a Count- er-Messaging Response. Abingdon: Routledge. Vidino, Lorenzo (Ed.) (2018): De-Radicalization in the Mediterranean: Comparing Challenges and Approaches. [e-Book]. Milan: Ledizioni LediPublishing. URL: https://www.ispionline.it/en/pubblicazione/de-radicaliza- tion-mediterranean-21009 Von Drachenfels, Magdalena; Offermann, Philipp; Wunderlich, Carmen (2018): Radikalisierung und De-Ra- dikalisierung in Deutschland: Eine gesamtgesellschaftliche Herausforderung. [e-Book]. Frankfurt am Main: Hes-

ISSN 2334-3745 95 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

sische Stiftung Friedens- und Konfliktforschung (HSFK). URL:https://gesellschaftextrem.hsfk.de/fileadmin/ HSFK/hsfk_publikationen/GE_Radikalisierung_und_De-Radikalisierung_in_Deutschland.pdf Weggemans, Daan; de Graaf, Beatrice (2019): Reintegrating Jihadist Extremist Detainees: Helping Extremist Offenders Back into Society. (Contemporary Terrorism Studies). Abingdon: Routledge. Zeiger, Sara; Aly, Anne (Eds.) (2015): Countering Violent Extremism: Developing an Evidence-Base for Pol- icy and Practice. [e-Book]. Abu Dhabi / Perth: Hedayah / Curtin University. URL: https://www.dmefor- peace.org/peacexchange/wp-content/uploads/2018/11/Countering-Violent-Extremism-Developing-an-Evi- dence-Base-for-Policy-and-Practice.pdf

Theses Abdikadir, Osman Ali (2016, October): Youth Radicalization as a Tool for Terrorism in East Africa: A Case Study of Kenya. (Master’s Thesis, University of Nairobi, Nairobi, Kenya). URL:http://erepository.uonbi.ac.ke/ handle/11295/99374 Allen, Ardith M. (2008): The Deradicalization of Columbus, Ohio’s Antirape Movement, 1972-2002.(Doctoral Thesis, Ohio State University, Columbus, United States). URL: http://rave.ohiolink.edu/etdc/view?acc_num=o- su1211996569 Ashour, Omar (2008, May): A World without Jihad? The Causes of De-Radicalization of Armed Islamist Move- ments. (Doctoral Thesis, McGill University, Montreal, ). URL:http://digitool.Library.McGill.CA:80/R/- ?func=dbin-jump-full&object_id=29750&silo_library=GEN01 Ayres, Jolene M. (2018, April): Counter-Radicalization: An Analysis on Violent Extremist Ideologies. (Doctoral Thesis, National American University, Rapid City, United States). URL:https://pqdtopen.proquest.com/pub - num/13807573.html Bakridi, Galliet (2016, March): The Role of the Muslim Community in the Municipality of The Hague Con- cerning Counter-Radicalization: Local Empirical Research Involving Community Engagement in Counter-Rad- icalization Measures. (Master’s Thesis, Leiden University, Leiden, The Netherlands). URL: http://hdl.handle. net/1887/53668 Barricman, Britni (2019, June): Deradicalizing and Disengaging the Children of the Islamic State. (Master’s The- sis, Naval Postgraduate School, Monterey, United States). URL: http://hdl.handle.net/10945/62805 Baudon, Antoine (2017, March): To Jihad and Back Home: Making Sense of French Individuals Engagement with Militant Salafi-Jihadism and Theorising their Disengagement. (Doctoral Thesis, Durham University, Durham, United Kingdom). URL: http://etheses.dur.ac.uk/12096 bin Abdul Rahman, Lendra Putra Nurezki (2013): A Hazy Redemption: Can Deradicalisation Work in Indo- nesia? (Master’s Thesis, National University of , Singapore). URL:https://scholarbank.nus.edu.sg/ handle/10635/53620 Brown, Christopher J. (2011, December): Countering Radicalization: Refocusing Responses to Violent Extremism within the United States. (Master’s Thesis, Naval Postgraduate School, Monterey, United States). URL:http:// hdl.handle.net/10945/10746 Brownlow, Walter Edward (2013): Shaping the Spread of Ideas: The Mechanics of Radicalization, Construc- tion of Strategic Narratives, and Intrinsicness of Strategic Communications to Counter Radicalization Strategy. (Master’s Thesis, University of North Carolina at Chapel Hill, Chapel Hill, United States). DOI:https://doi. org/10.17615/3n3v-zs41

ISSN 2334-3745 96 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

De Keyzer, Heleen (2018): Is there Space for De-Radicalisation and Disengagement in Prison? Comparison be- tween Belgium and Sweden. (Master’s Thesis, Malmö University, Malmö, Sweden). URL:http://muep.mau.se/ handle/2043/25465 Detweiler, Nura Estella (2017): Counter-Radicalization Policies – A Threat to the Principles of Democratic Edu- cation? A German Case-Study. (Master’s Thesis, Leiden University, Leiden, The Netherlands). URL: http://hdl. handle.net/1887/52675 Dubaz, Nicholas R. (2016, June): Bringing the Meaning Back in: Exploring Existentially Motivated Terrorism. (Master’s Thesis, Naval Postgraduate School, Monterey, United States). URL:http://hdl.handle.net/10945/49447 Duvall, Justin A.; Novy, Lee C.; Knox, Calvin A. (2012, December): An Analysis of Modern State-Level Terror- ist Deradicalization Campaigns. (Master’s Thesis, Naval Postgraduate School, Monterey, United States). URL: http://hdl.handle.net/10945/27823 Elshimi, Mohammed Samir (2015, November): The Concept and Practice of De-Radicalisation in the PREVENT Strand of the UK Counter-Terrorism Strategy: What Is De-Radicalisation? (Doctoral Thesis, University of Exeter, Exeter, United Kingdom). URL: http://hdl.handle.net/10871/22105 Ezzarqui, Leila (2010, April): De-Radicalization and Rehabilitation Program: The Case Study of Saudi Ara- bia. (Master’s Thesis, Georgetown University, Washington, DC, United States). URL:http://hdl.handle. net/10822/553485 Feldstein, Michelle (2015, May): Into the Fold: Evaluating Different Countries’ Programs to De-Radicalize Isla- mist Extremists and Islamist Terrorists. (Master’s Thesis, Johns Hopkins University, Baltimore, United States). URL: http://jhir.library.jhu.edu/handle/1774.2/38083 Golan, Guy D. (2016, May): Countering Violent Extremism: A Whole Community Approach to Prevention and Intervention. (Master’s Thesis, California State University, Long Beach, United States). URL:https://pqdtopen. proquest.com/pubnum/10065201.html Hendrickson, Jennifer S. (2014, August): Counter-Radicalization: Combating Terrorism at the Core: A Study of the Motivations and Inspirational Leaders behind Radicalization to Violent Extremism and the Programs De- signed to Combat them. (Master’s Thesis, Johns Hopkins University, Baltimore, United States). URL: http://jhir. library.jhu.edu/handle/1774.2/38096 Johnston, Amanda K. (2009, December): Assessing the Effectiveness of Deradicalization Programs on Islamist Extremists. (Master’s Thesis, Naval Postgraduate School, Monterey, United States). URL: http://hdl.handle. net/10945/4420 Kastart, Wynand (2019, August): Regime Legacies and Domestic Peace: Evidence from Latin America. (Doc- toral Thesis, Indiana University, Bloomington, United States). URL:https://pqdtopen.proquest.com/pub - num/22592252.html Keys-Turner, Karen D. (2011, December): The Violent Islamic Radicalization Process: A Framework for Un- derstanding. (Master’s Thesis, Naval Postgraduate School, Monterey, United States). URL:http://hdl.handle. net/10945/10630 Kosseim, Amin G. (2011, September): Counter-Radicalization: Best Practices in the United States and Lessons Learned from Abroad. (Master’s Thesis, Naval Postgraduate School, Monterey, United States). URL: http://hdl. handle.net/10945/5568 Lavarias, Romeo B. (2015, March): Winning the Hearts and Minds: Improving U.S. Counter-Radicalization Ef- forts through a Study of the United Kingdom’s Prevent Strategy. (Master’s Thesis, Naval Postgraduate School, Monterey, United States). URL: http://hdl.handle.net/10945/45214

ISSN 2334-3745 97 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Lee, Douglas R. (2014, December): Prison Radicalization in County Jails: Disrupting Terrorist Acts through Information Sharing. (Master’s Thesis, Naval Postgraduate School, Monterey, United States). URL:http://hdl. handle.net/10945/44604 Maynard, Joshua (2015, Fall): Radicalization Discourse in the United States: Analysis of the July 15, 2015 U.S. House of Representative Hearing on the Rise of Radicalization. (Master’s Thesis, University of Malta, Valletta, Malta). URL: http://hdl.handle.net/1920/10257 Muis, Iris Marijke (2015, July): Amsterdam’s Counter-Radicalization Policy: Struggling with the Separation be- tween Church and State. (Master’s Thesis, Utrecht University, Utrecht, The Netherlands). URL: https://dspace. library.uu.nl/handle/1874/320416 Murthy, Arvind (2012, May): Protecting New York City from Homegrown Terrorism: The City’s Role in Radical- ization and Counter-Radicalization. (Master’s Thesis, Columbia University, New York City, United States). DOI: https://doi.org/10.7916/D81N877Z Mushtaq, Rehan (2009, June): De-Radicalization of Muslim Communities in the UK. (Master’s Thesis, Naval Postgraduate School, Monterey, United States). URL: http://hdl.handle.net/10945/4690 Mykkänen, Tina (2018): An Assessment of Returning Foreign Terrorist Fighters’ Commitment to Reintegrate: A Case Study of Kwale County, Kenya. (Bachelor’s Thesis, Linnaeus University, Växjö / Kalmar, Sweden). URL: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-75957 Narkevich, Anastasia (2017): The Role of Community in Countering Radicalization to Violence: A Winnipeg Case- Study. (Master’s Thesis, University of Manitoba, Winnipeg, Canada). URL:http://hdl.handle.net/1993/32696 Neudecker, Christine Helene (2017, Summer): CVE Programs and Initiatives through the Ages: A Snapshot of the Past, Present, and Future. (Master’s Thesis, Simon Fraser University, Burnaby, Canada). URL: http://sum- mit.sfu.ca/item/17537 Panteli, Paraskevi (2016, September): Prevention of Radicalisation and Violent Extremism of Potential Home- grown Terrorists: Reverse Inner Reinforcement through EU Education. (Master’s Thesis, Leiden University, Leiden, The Netherlands). URL:http://hdl.handle.net/1887/43680 Parker, Tony C. (2013, March): Establishing a Deradicalization/Disengagement Model for America’s Correctional Facilities: Recommendations for Countering Prison Radicalization. (Master’s Thesis, Naval Postgraduate School, Monterey, United States). URL: http://hdl.handle.net/10945/32881 Payne, Melissa Alyece (2017, June): Toujours Le Choix: The Role of Entertainment Education in Radicalization Prevention. (Master’s Thesis, The American University of Paris, Paris, France). URL: https://pqdtopen.pro- quest.com/pubnum/13871602.html Pendleton, Paul (2008, December): Countering Terrorist Ideologies: A Rational Actor and Game Theoretic Anal- ysis of De-Radicalization Programs for Al-Jemaah Al-Islamiyah Prisoners in Singapore and Indonesia. (Master’s Thesis, Naval Postgraduate School, Monterey, United States). URL:http://hdl.handle.net/10945/3772 Pierson, Vern (2017, March): Western Radicalization: Rethinking the Psychology of Terrorism. (Master’s Thesis, Naval Postgraduate School, Monterey, United States). URL: http://hdl.handle.net/10945/53034 Powell, John Eric (2016, September): Creating a Learning Organization for State, Local, and Tribal Law Enforce- ment to Combat Violent Extremism. (Master’s Thesis, Naval Postgraduate School, Monterey, United States). URL: http://hdl.handle.net/10945/50468 Sampson, Kirk J. (2009, September): Winning the Battle of Ideas through Individual Resiliency: A Multi-Dimen- sional Approach for Countering Radicalization in the Homeland. (Master’s Thesis, Naval Postgraduate School, Monterey, United States). URL: http://hdl.handle.net/10945/4626

ISSN 2334-3745 98 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Shah, Zahra (2016, January): Countering Radicalisation by Engaging Mosques and Imams: The UK’s Case. (Master’s Thesis, Leiden University, Leiden, The Netherlands). URL:https://openaccess.leidenuniv.nl/han - dle/1887/38036 Sikkens, Elga (2018): Relating to Radicalism: Family and Upbringing Experiences in Radicalization and De-Rad- icalization. (Doctoral Thesis, Utrecht University, Utrecht, The Netherlands). URL: https://dspace.library.uu.nl/ handle/1874/373426 Sugen, Sujitha (2017, December): The Radicals Are Coming! On the Institutionalization, Tensions, and Racial- ization of Anti-Radicalization Practices in Montreal and in Quebec. (Master’s Thesis, Concordia University, Montréal, Canada). URL: https://spectrum.library.concordia.ca/983325 Tansey, Colin M. (2009, March): Anti-Radicalization Efforts within the European Union: Spain and Denmark. (Master’s Thesis, Naval Postgraduate School, Monterey, United States). URL:http://hdl.handle.net/10945/4895 Woodhams, Katrina Marie (2016, December): Connections among Communities: Preventing Radicalization and Violent Extremism through Social Network Analysis in the Threat and Hazard Identification and Risk Assessment (THIRA) Framework. (Master’s Thesis, Naval Postgraduate School, Monterey, United States). URL: http://hdl. handle.net/10945/51640 .

Journal Articles and Book Chapters A., Thomas [Pseudonym] (2014): Verantwortung in einem verantwortungslosen System: Reflexionen eines Aussteigers aus der rechtsextremen Szene. JEX, 3 (2014), 189-195. URL: http://journals.sfu.ca/jed/index.php/ jex/article/view/101 Aarten, Pauline G. M.; Mulder, Eva; Pemberton, Antony (2018): The Narrative of Victimization and Deradi- calization: An Expert View. Studies in Conflict & Terrorism, 41(7), 557-572. DOI: https://doi.org/10.1080/105 7610X.2017.1311111 Aasgaard, Andrea (2017-2018, Winter): Scandinavia’s Daughters in the : What Can we Learn from their Family Members’ Lived Experiences? Journal for Deradicalization, 13, 243-275. URL: http://jour- nals.sfu.ca/jd/index.php/jd/article/view/130 Abbasi, Sobia (2014, January): De-Radicalization Strategy: Prospects for Rehabilitation of Ex-Militants. TI- GAH, 4, 110-130. URL: http://frc.org.pk/wp-content/uploads/2014/01/Research-Paper-61.pdf Abdalla, Salma Mohamed Abdalmunim (2019, Fall): Fighting the Enemies of God: The Rise of and the Re- sponse to Violent Extremism in Sudan. Journal for Deradicalization, 20, 75-108. URL: http://journals.sfu.ca/ jd/index.php/jd/article/view/249 Abdel-Fattah, Randa (2019): Managing Belief and Speech as Incipient Violence: ‘I’m Giving you the Opportu- nity to Say that you Aren’t’. Journal of Policing, Intelligence and Counter Terrorism, 14(1), 20-38. DOI: https:// doi.org/10.1080/18335330.2019.1566632 Agerschou, Toke (2014-2015, Winter): Preventing Radicalization and Discrimination in Aarhus. Journal for Deradicalization, 1, 5-22. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/2 Aggarwal, Neil Krishan (2013): Mental Discipline, Punishment and Recidivism: Reading Foucault against De-Radicalisation Programmes in the War on Terror. Critical Studies on Terrorism, 6(2), 262-278. DOI: https:// doi.org/10.1080/17539153.2012.749059 Aggarwal, Neil Krishan (2015): Knowledge and Practice in War on Terror Deradicalization Programs. In: Men- tal Health in the War on Terror: Culture, Science, and Statecraft. New York: Columbia University Press, 133-156.

ISSN 2334-3745 99 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Ahmad, Hafal (Haval) (2017, Fall): Youth De-Radicalization: A Canadian Framework. Journal for Deradical- ization, 12, 119-168. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/113 Ahmad, Hafal (Haval); Masinda, Mambo Tabu (2018-2019, Winter): Research Note on Immigrant Youth Rad- icalization and Terrorism: Pre- and Post-Migration Considerations. Journal for Deradicalization, 17, 295-312. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/181 Ahmed, Kawser (2016, Spring): Radicalism Leading to Violent Extremism in Canada: A Multi-Level Analysis of Muslim Community and University Based Student Leaders’ Perceptions and Experiences. Journal for Derad- icalization, 6, 231-271. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/49 Aistrope, Tim (2016): Social Media and Counterterrorism Strategy. Australian Journal of International Affairs, 70(2), 121-138. DOI: https://doi.org/10.1080/10357718.2015.1113230 Aistrope, Tim (2016): The Muslim Paranoia Narrative in Counter-Radicalisation Policy. Critical Studies on Terrorism, 9(2), 182-204. DOI: https://doi.org/10.1080/17539153.2016.1175272 Akbarzadeh, Shahram (2013): Investing in Mentoring and Educational Initiatives: The Limits of De-Radical- isation Programmes in Australia. Journal of Muslim Minority Affairs, 33(4), 451-463. DOI: https://doi.org/1 0.1080/13602004.2013.866347 URL: http://www.deakin.edu.au/__data/assets/pdf_file/0005/184559/Akbarza- deh-JMMA2013-De-radicalisation.pdf Al-Badayneh, Diab M.; Alhasan, Khawla (2016): Religious Behavior and Radicalization among Arab Youth: Implications for Terrorism Recruitment and De-Radicalization. In: Siddik Ekici et al. (Eds.): Countering Ter- rorist Recruitment in the Context of Armed Counter-Terrorism Operations. (NATO Science for Peace and Secu- rity Series – E: Human and Societal Dynamics, Vol. 125). Amsterdam: IOS Press, 130-145. DOI: https://doi. org/10.3233/978-1-61499-613-2-130 All Together Now (2013): Tackling White Supremacy, Australian Style. JEX, 2 (2013), 45-53. URL: http://jour- nals.sfu.ca/jed/index.php/jex/article/view/19 Al Majali, Hussein; Watson, Robert Akira (2017): “Terrorism” and “Extremism” and the Implications for CVE Strategy. In: Alessandro Niglia; Amer Al Sabaileh; Amani (Amneh) Hammad (Eds.): Countering Terrorism, Preventing Radicalization and Protecting Cultural Heritage. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 133). Amsterdam: IOS Press, 19-33. DOI: https://doi.org/10.3233/978-1- 61499-755-9-19 Almohammad, Asaad (2018, Summer): From Total Islam to the Islamic State: Radicalization Leading to Vi- olence Dynamics as a Subject of Reciprocal Affordance Opportunities. Journal for Deradicalization, 15, 1-42. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/148 Al Raffie, Dina (2015, February): Straight from the Horse’s Mouth: Exploring De-Radicalization Claims of Former Egyptian Militant Leaders. Perspectives on Terrorism, 9(1), 27-48. URL: https://www.universiteitle- iden.nl/binaries/content/assets/customsites/perspectives-on-terrorism/2015/volume-1/3-straight-from-the- horse%E2%80%99s-mouth-exploring-de-radicalization-claims-of-former-egyptian-militant-leaders-27-by- dina-al-raffie.pdf al-Saud, Abdullah bin (2017, April): The Tranquillity Campaign: A Beacon of Light in the Dark World Wide Web. Perspectives on Terrorism, 11(2), 58-64. URL: https://www.universiteitleiden.nl/binaries/content/ assets/customsites/perspectives-on-terrorism/2017/issue-2/0620172-the-tranquillity-campaign-a-beacon-of- light-in-the-dark-world-wide-web-by-abdullah-bin-khaled-al-saud.pdf Altermark, Niklas; Nilsson, Hampus (2018, March): Crafting the “Well-Rounded Citizen”: Empowerment and the Government of Counterradicalization. International Political Sociology, 12(1), 53-69. DOI: https://doi. org/10.1093/ips/olx028

ISSN 2334-3745 100 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Aly, Anne (2014): Walk Away from Violent Extremism: A Campaign to Address Violent Extremism Online. JEX, 3 (2014), 64-77. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/92 Ambrozik, Caitlin (2019, October): Countering Violent Extremism Globally: A New Global CVE Dataset. Perspectives on Terrorism, 13(5), 102-111. URL: https://www.universiteitleiden.nl/binaries/content/assets/cus- tomsites/perspectives-on-terrorism/2019/issue-5/7--ambrozik.pdf Andersson Malmros, Robin (2019, Spring): From Idea to Policy: Scandinavian Municipalities Translating Radi- calization. Journal for Deradicalization, 18, 38-73. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/185 Anindya, Chaula Rininta (2019, Spring): The Deradicalisation Programme for Indonesian Deportees: A Vac- uum in Coordination. Journal for Deradicalization, 18, 217-243. URL: http://journals.sfu.ca/jd/index.php/jd/ article/view/195 Ansorg, Nadine; Strasheim, Julia (2019): Veto Players in Post-Conflict DDR Programs: Evidence from Nepal and the DRC. Journal of Intervention and Statebuilding, 13(1), 112-130. DOI: https://doi.org/10.1080/1750297 7.2018.1501981 Armborst, Andreas (2014, October): Radicalisation and De-Radicalisation of Social Movements: The Come- back of Political Islam? Crime, Law and Social Change, 62(3), 235-255. DOI: https://doi.org/10.1007/s10611- 013-9464-8 Ashour, Omar (2007, Autumn): Lions Tamed? An Inquiry into the Causes of De-Radicalization of Armed Islamist Movements: The Case of the Egyptian Islamic Group. The Middle East Journal, 61(4), 596-625. DOI: https://doi.org/10.3751/61.4.12 Ashour, Omar (2008, March): De-Radicalization of Jihad? The Impact of Egyptian Islamist Revisionists on Al-Qaeda. Perspectives on Terrorism, 2(5), 11-14. URL: https://www.universiteitleiden.nl/binaries/content/as- sets/customsites/perspectives-on-terrorism/2008/issue-5/36-225-1-pb.pdf Ashour, Omar (2010, December): Online De-Radicalization? Countering Violent Extremist Narratives: Mes- sage, Messenger and Media Strategy. Perspectives on Terrorism, 4(6), 15-19. URL: https://www.universiteitle- iden.nl/binaries/content/assets/customsites/perspectives-on-terrorism/2010/issue-6/online-de-radicaliza- tion-countering-violent-extremist-narratives-message-messenger-and-media-strategy--omar-ashour.pdf Augustin, Marius (2017): Meinen eigenen Weg gehen. JEX, 5 (2017), 110-116. URL: http://journals.sfu.ca/jed/ index.php/jex/article/view/110 Auld, Johnnie (2015, Fall): The Need for a National Deradicalisation Program in Afghanistan. Journal for De- radicalization, 4, 206-225. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/30 Awadallah, Alia (2019, October): Transparency Needed: The Prosecution, Detention, and Deradicalization of Foreign Fighters. Small Wars Journal, 10/2019. URL: https://smallwarsjournal.com/jrnl/art/transparen- cy-needed-prosecution-detention-and-deradicalization-foreign-fighters Azam, Zubair; Fatima, Syeda Bareeha (2017, Summer): Mishal: A Case Study of a Deradicalization and Eman- cipation Program in SWAT Valley, Pakistan. Journal for Deradicalization, 11, 1-29. URL: http://journals.sfu.ca/ jd/index.php/jd/article/view/97 Baaken, Till; Schlegel, Linda (2017-2018, Winter): Fishermen or Swarm Dynamics? Should we Understand Ji- hadist Online-Radicalization as a Top-Down or Bottom-Up Process? Journal for Deradicalization, 13, 178-212. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/127 Badurdeen, Fathima Azmiya; Goldsmith, Paul (2018, Fall): Initiatives and Perceptions to Counter Violent Ex- tremism in the Coastal Region of Kenya. Journal for Deradicalization, 16, 70-102. URL: http://journals.sfu.ca/ jd/index.php/jd/article/view/162

ISSN 2334-3745 101 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Bailey, Gavin; Edwards, Phil (2017, Spring): Rethinking “Radicalisation”: Microradicalisations and Reciprocal Radicalisation as an Intertwined Process. Journal for Deradicalization, 10, 255-281. URL: http://journals.sfu.ca/ jd/index.php/jd/article/view/92 Bakker, Edwin (2015): Assumption Two: De-Radicalization of Terrorists Is Possible. In: Terrorism and Coun- terterrorism Studies: Comparing Theory and Practice. Leiden: Leiden University Press, 150-159. Bakker, Edwin (2015): EU Counter-Radicalization Policies: A Comprehensive and Consistent Approach? Intel- ligence and National Security, 30(2-3), 281-305. DOI: https://doi.org/10.1080/02684527.2014.988442 Barkindo, Atta; Bryans, Shane (2016, Summer): De-Radicalising Prisoners in Nigeria: Developing a Basic Pris- on Based De-Radicalisation Programme. Journal for Deradicalization, 7, 1-25. URL: http://journals.sfu.ca/jd/ index.php/jd/article/view/56 Barna, Cristian (2015): The Road to Jihad in Syria – Using SOCMINT to Counter the Radicalization of Muslim Youth in . In: Marco Lombardi et al. (Eds.): Countering Radicalisation and Violent Extremism among Youth to Prevent Terrorism. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 118). Amsterdam: IOS Press, 190-197. DOI: https://doi.org/10.3233/978-1-61499-470-1-190 Barten, Koos (2013): The Dutch Approach towards Radicalisation: Prevention, Detection and Intervention. JEX, 3 (2013), 72-83. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/41 Basit, Abdul (2015, October): Pakistan’s Militant Rehabilitation Programme: An Overview. Counter Terrorist Trends and Analyses, 7(9), 10-17. URL: https://www.rsis.edu.sg/wp-content/uploads/2015/10/CTTA-Octo- ber-2015.pdf Bastug, Mehmet F.; Evlek, Ugur K. (2016, Fall): Individual Disengagement and Deradicalization Pilot Program in Turkey: Methods and Outcomes. Journal for Deradicalization, 8, 25-45. URL: http://journals.sfu.ca/jd/index. php/jd/article/view/65 Batzdorfer, Veronika; Steinmetz, Holger; Bosnjak, Michael (2020): Big Data in der Radikalisierungsforschung: Eine systematische Übersichtsarbeit. Psychologische Rundschau. [in press] Becker, Joe (2017, June): Why the U.S. Military Should Support Domestic CVE. Perspectives on Terrorism, 11(3), 71-76. URL: https://www.universiteitleiden.nl/binaries/content/assets/customsites/perspectives-on-ter- rorism/2017/issue-3/0620173-why-the-u.s.-military-should-support-domestic-cve-by-joe-becker.pdf Belanger, Patrick; Szmania, Susan (2018): The Paradox of Source Credibility in Canadian and U.S. Domestic Counterterrorism Communications. International Journal of Communication, 12, 1459–1480. DOI: https:// ijoc.org/index.php/ijoc/article/view/5638 Bell, Kristen (2015): Looking Outward: Enhancing Australia’s Deradicalisation and Disengagement Programs. Security Challenges, 11(2), 1-19. URL: https://www.regionalsecurity.org.au/resources/Documents/SC%20 11-2%20BELL.pdf Benneckenstein, Felix et al. (2018): Wenn aus Vorurteilen Urteile werden und Urteilen Konsequenzen fol- gen: Perspektiven auf den Ausstieg. JEX, 7 (2018), 78-84. URL: http://journals.sfu.ca/jed/index.php/jex/article/ view/78 Berczyk, Julia (2013): Community-Based Counter-Terrorism and Anti-Extremism Policies and the ZDK’s “Community Coaching”. JEX, 2 (2013), 100-122. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/25 Berczyk, Julia (2015): Returning from the IS: Experiences from the Counseling Service HAYAT-Germany. In: Janusz Biene; Martin Schmetz (Eds.): Kalifat des Terrors: Interdisziplinäre Perspektiven auf den Islamischen Staat. (Sicherheitspolitik-Blog Fokus). Frankfurt: Sicherheitspolitik-Blog, 77-84. URL: https://www.sicherhe- itspolitik-blog.de/files/2015/07/Kalifat-des-Terrors.pdf

ISSN 2334-3745 102 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Berczyk, Julia (2016): Returning from the “Islamic State” – Experiences from the Counseling Service HA- YAT-Germany. JEX, 3 (2016), 47-51. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/143 Berkell, Kelly (2017-2018, Winter): Risk Reduction in Terrorism Cases: Sentencing and the Post-Conviction Environment. Journal for Deradicalization, 13, 276-341. URL: http://journals.sfu.ca/jd/index.php/jd/article/ view/131 Bertelsen, Preben (2015): Danish Preventive Measures and De-Radicalization Strategies: The Aarhus Model. In: Wilhelm Hofmeister; Megha Sarmah (Eds.): From the Desert to World Cities: The New Terrorism. (KAS Pan- orama, 01/2015). Singapore: Konrad-Adenauer-Stiftung (KAS), 241-253. URL:https://www.kas.de/en/web/ politikdialog-asien/single-title/-/content/from-the-desert-to-world-cities-the-new-terrorism-1 Bertram, Luke (2015-2016, Winter): How Could a Terrorist Be De-Radicalised? Journal for Deradicalization, 5, 120-149. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/37 Bertram, Luke (2016, Summer): Terrorism, the Internet and the Social Media Advantage: Exploring how Ter- rorist Organizations Exploit Aspects of the Internet, Social Media and how these same Platforms could be used to Counter Violent Extremism. Journal for Deradicalization, 7, 225-252. URL: http://journals.sfu.ca/jd/index. php/jd/article/view/63 Bin Hassan, Ahmad Saiful Rijal (2019, March): Denmark’s De-Radicalisation Programme for Returning For- eign Terrorist Fighters. Counter Terrorist Trends and Analyses, 11(3), 13-16. URL: https://www.rsis.edu.sg/ wp-content/uploads/2019/03/CTTA-March-2019.pdf Biskamp, Floris; Hößl, Stefan E. (2014): Handlungsstrategien, Möglichkeiten und Grenzen von politischer Bil- dung und Pädagogik im Kontext von Islamismus und islamistischer Radikalisierung. JEX, 2 (2014), 190-233. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/75 Borstel, Dierk (2013): Schnittstelle Fußball – Ein Aussteiger berichtet über Fußballfans, Hooligans, Ultras und die rechtsextremen Schnittstellen. JEX, 2 (2013), 214-219. URL: http://journals.sfu.ca/jed/index.php/jex/arti- cle/view/30 Boucek, Christopher (2008, August): The Sakinah Campaign and Internet Counter-Radicalization in Saudi Arabia. CTC Sentinel, 1(9), 1-4. URL: https://ctc.usma.edu/app/uploads/2010/07/CTCSentinel-Vol1Iss9.pdf Braddock, Kurt (2014): The Talking Cure? Communication and Psychological Impact in Prison De-Radicali- sation Programmes. In: Andrew Silke (Ed.): Prisons, Terrorism and Extremism: Critical Issues in Management, Radicalisation and Reform. (Political Violence). Abingdon: Routledge, 60-74. Braddock, Kurt (2018): Terrorist Disengagement and De-Radicalisation. In: Andrew Silke (Ed.): Routledge Handbook of Terrorism and Counterterrorism. (Routledge Handbooks). Abingdon: Routledge, 458-470. British Embassy Stockholm, (2013): Countering Violent Extremism across the Nordic Baltic Network: A Con- ference Report and Introduction to the NBN. JEX, 3 (2013), 1-3. URL: http://journals.sfu.ca/jed/index.php/ jex/article/view/36 Bröckling, Micha et al. (2018-2019, Winter): “Kill Them Wherever You Find Them” – Radicalizing Narratives of the “So-Called” Islamic State via the Online Magazine Rumiyah. Journal for Deradicalization, 17, 240-294. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/180 Brown, Katherine E.; Saeed, Tania (2015): Radicalization and Counter-Radicalization at British Universities: Muslim Encounters and Alternatives. Ethnic and Racial Studies, 38(11), 1952-1968. DOI: https://doi.org/10.10 80/01419870.2014.911343 Brzuszkiewicz, Sara (2016-2017, Winter): Political De-Radicalization: Why it is no Longer Possible in the wilāyāt System of the Islamic State. Journal for Deradicalization, 9, 185-204. URL: http://journals.sfu.ca/jd/ index.php/jd/article/view/76

ISSN 2334-3745 103 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Chalmers, Dana Lori (2015, Fall): Ideologically Challenging Entertainment (ICE). Journal for Deradicalization, 4, 71-119. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/26 Chassman, Alyssa (2016-2017, Winter): Islamic State, Identity, and the Global Jihadist Movement: How is Is- lamic State Successful at Recruiting “Ordinary” People? Journal for Deradicalization, 9, 205-259. URL: http:// journals.sfu.ca/jd/index.php/jd/article/view/77 Cherney, Adrian (2016): Designing and Implementing Programmes to Tackle Radicalization and Violent Ex- tremism: Lessons from Criminology. Dynamics of Asymmetric Conflict: Pathways toward terrorism and geno- cide, 9(1-3), 82-94. DOI: https://doi.org/10.1080/17467586.2016.1267865 Cherney, Adrian (2018-2019, Winter): Supporting Disengagement and Reintegration: Qualitative Outcomes from a Custody-Based Counter Radicalisation Intervention. Journal for Deradicalization, 17, 1-27. URL: http:// journals.sfu.ca/jd/index.php/jd/article/view/174 Christensen, Tina Wilchen (2015, Summer): How Extremist Experiences Become Valuable Knowledge in EXIT Programmes. JEX, 3, 92-134. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/18 Christoph, Stefan (2015, Fall): Funktionslogik terroristischer Propaganda im bewegten Bild. Journal for Derad- icalization, 4, 145-205. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/29 Clark, Michael D. (2019, Fall): Motivational Interviewing for Deradicalization: Increasing the Readiness to Change. Journal for Deradicalization, 20, 47-74. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/245 Clubb, Gordon (2015): De-Radicalization, Disengagement and the Attitudes-Behavior Debate. In: Caroline Kennedy-Pipe; Gordon Clubb; Simon Mabon (Eds.): Terrorism and Political Violence. Los Angeles: SAGE, 258-266. Clubb, Gordon (2016): The Role of Former Combatants in Preventing Youth Involvement in Terrorism in Northern Ireland: A Framework for Assessing Former Islamic State Combatants. Studies in Conflict & Ter- rorism, 39(9), 842-861. DOI: https://doi.org/10.1080/1057610X.2016.1144917 URL: http://eprints.whiterose. ac.uk/95959 Clubb, Gordon; McDaid, Shaun (2019, October): The Causal Role of Ideology and Cultural Systems in Radi- calisation and De-Radicalisation. Journal of Critical Realism, 18(5), 513-528. DOI: https://doi.org/10.1080/14 767430.2019.1667655 Clubb, Gordon; O’Connor, Ryan (2019, May): Understanding the Effectiveness and Desirability of De-Radi- calisation: How De-Radicalisation is Framed in The Daily Mail.The British Journal of Politics and Internation- al Relations, 21(2), 349-366. DOI: https://doi.org/10.1177/1369148118819067 URL: http://eprints.whiterose. ac.uk/137739/3/Final%20Draft%20De-Radicalisation%20Daily%20Mail%2011-10-18.pdf Clubb, Gordon; Tapley, Marina (2018): Conceptualising De-Radicalisation and Former Combatant Re-Inte- gration in Nigeria. Third World Quarterly, 39(11), 2053-2068. DOI: https://doi.org/10.1080/01436597.2018.1 458303 URL: https://www.researchgate.net/profile/Gordon_Clubb/publication/324782297_Conceptualising_ de-radicalisation_and_former_combatant_re-integration_in_Nigeria Clubb, Gordon et al. (2019-2020, Winter): Revisiting the De-Radicalisation or Disengagement Debate: Public Attitudes to the Re-Integration of Terrorists. Journal for Deradicalization, 21, 84-116. URL: http://journals.sfu. ca/jd/index.php/jd/article/view/279 Coolsaet, Rik (2011): Counterterrorism and Counter-Radicalisation in Europe: How much Unity in Diversity? In: Rik Coolsaet (Ed.): Jihadi Terrorism and the Radicalisation Challenge: European and American Experiences. (2nd ed.). Farnham: Ashgate, 227-246. Corb, Abbee; Grozelle, Renee (2014): A New Kind of Terror: Radicalizing Youth in Canada. JEX, 1 (2014), 32- 58. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/55

ISSN 2334-3745 104 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Cragin, R. Kim (2014): Resisting Violent Extremism: A Conceptual Model for Non-Radicalization. Terrorism and Political Violence, 26(2), 337-353. DOI: https://doi.org/10.1080/09546553.2012.714820 Cronin, Audrey Kurth (2017): Examining Deradicalization Programs. Pathways to Peace and Security, 1/52, 106-115. DOI: https://doi.org/10.20542/2307-1494-2017-1-106-115 Dafnos, Andreas (2013): Lone Wolf Terrorism as Category: Learning from the Breivik Case. JEX, 3 (2013), 96- 114. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/45 Dafnos, Andreas (2014): Narratives as a Means of Countering the Radical Right: Looking into the Trojan T-Shirt Project. JEX, 3 (2014), 156-188. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/98 Dalgaard-Nielsen, Anja (2016, December): Countering Violent Extremism with Governance Networks. Per- spectives on Terrorism, 10(6), 135-139. URL: https://www.universiteitleiden.nl/binaries/content/assets/cus- tomsites/perspectives-on-terrorism/2016/issue-6/613-countering-violent-extremism-with-governance-net- works-by-anja-dalgaard-nielsen.pdf Dalgaard-Nielsen, Anja (2017): Patterns of Disengagement from Violent Extremism: A Stocktaking of Current Knowledge and Implications for Counterterrorism. In: Kristian Steiner; Andreas Önnerfors (Eds.): Expressions of Radicalization: Global Politics, Processes and Practices. Cham: Palgrave Macmillan / Springer Nature, 273- 293. DOI: https://link.springer.com/chapter/10.1007/978-3-319-65566-6_10 Dantschke, Claudia; Köhler, Daniel (2013): Angehörigenberatung und Deradikalisierung: Theoretische und praktische Implikationen, sowie erster inhaltlicher Bericht über die Beratungsstelle Hayat. JEX, 1 (2013), 184- 199. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/14 Dantschke, Claudia et al. (2018): Zurück aus dem „Kalifat“: Anforderungen an den Umgang mit Rückkeh- rern und Rückkehrerinnen, die sich einer jihadistisch-terroristischen Organisation angeschlossen haben, und ihren Kindern unter dem Aspekt des Kindeswohles und der Kindeswohlgefährdung. JEX, 6 (2018), 2-43. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/01 Daugherty, Casie Elizabeth (2019-2020, Winter): Deradicalization and Disengagement: Exit Programs in Nor- way and Sweden and Addressing Neo-Nazi Extremism. Journal for Deradicalization, 21, 219-260. URL: http:// journals.sfu.ca/jd/index.php/jd/article/view/287 Davies, Garth et al. (2016, Spring): Toward a Framework Understanding of Online Programs for Countering Violent Extremism. Journal for Deradicalization, 6, 51-86. URL: http://journals.sfu.ca/jd/index.php/jd/article/ view/43 Dawson, Lorne (2019, Spring): Clarifying the Explanatory Context for Developing Theories of Radicalization: Five Basic Considerations. Journal for Deradicalization, 18, 146-184. URL: http://journals.sfu.ca/jd/index.php/ jd/article/view/191 Dechesne, Mark (2014): The Strategic Use of Deradicalization.JEX , 1 (2014), 177-186. URL: http://journals. sfu.ca/jed/index.php/jex/article/view/59 Dechesne, Mark (2015, Summer): Radicalization and Mass Violence from a Beckerian Perspective: Conceptual and Empirical Considerations. Journal for Deradicalization, 3, 149-177. URL: http://journals.sfu.ca/jd/index. php/jd/article/view/20 Dechesne, Mark; De Roon, Charlotte (2013): Coming Home: Deradicalization for Returning Syria Jihadis. JEX, 3 (2013), 84-95. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/42 De Coensel, Stéphanie (2018-2019, Winter): Processual Models of Radicalization into Terrorism: A Best Fit Framework Synthesis. Journal for Deradicalization, 17, 89-127. URL: http://journals.sfu.ca/jd/index.php/jd/ article/view/176

ISSN 2334-3745 105 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Demirel, Aycan; Niehoff, Mirko (2014): ZusammenDenken: Elf Thesen zur Islamismusprävention an Schulen. JEX, 2 (2014), 21-34. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/69 de Montclos, Marc-Antoine Pérouse (2018): “The Only Good Jihadist Is a Dead Jihadist”: Boko Haram and De-Radicalization around Lake Chad. Small Wars & Insurgencies, 29(5-6), 863-885. DOI: https://doi.org/10.1 080/09592318.2018.1519297 De Vito, Christian G. (2014): Processes of Radicalization and De-Radicalization in Western European Prisons (1965-1986). In: Lorenzo Bosi; Chares Demetriou; Stefan Malthaner (Eds.): Dynamics of Political Violence: A Process-Oriented Perspective on Radicalization and the Escalation of Political Conflict. (The Mobilization Series on Social Movements, Protest, and Culture). Abingdon: Routledge, 71-92. (Original work published 2014) Dienstbühl, Dorothee; Weber, Meike (2014): Rekrutierung im Cyberspace – wie Extremisten das Internet nu- tzen. JEX, 2 (2014), 35-45. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/70 Doosje, Bertjan et al. (2016, October): Terrorism, Radicalization and De-Radicalization. Current Opinion in Psychology, 11, 79-84. DOI: https://doi.org/10.1016/j.copsyc.2016.06.008 URL: https://nvvb.nl/media/cms_ page_media/694/Terrorism%2C%20radicalization%20and%20de-radicalization.pdf Douvier, Dina (2013): Der Fall des Nationalsozialistischen Untergrundes (NSU): Perspektiven aus der Ange- hörigenberatung. JEX, 1 (2013), 94-107. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/6 Dresser, Paul (2018, Fall): Counter-Radicalisation through Safeguarding: A Political Analysis of the Count- er-Terrorism and Security Act (2015). Journal for Deradicalization, 16, 125-164. URL: http://journals.sfu.ca/ jd/index.php/jd/article/view/165 Dresser, Paul (2019): “Trust Your Instincts – Act!” PREVENT Police Officers’ Perspectives of Counter-Radi- calisation Reporting Thresholds. Critical Studies on Terrorism, 12(4), 605-628. DOI: https://doi.org/10.1080/1 7539153.2019.1595344 Dryden, Matt (2017-2018, Winter): Radicalisation: The Last Taboo in Safeguarding and Child Protection? Assessing Practitioner Preparedness in Preventing the Radicalisation of Looked-After Children. Journal for Deradicalization, 13, 101-136. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/125 Edwards, Phil (2019-2020, Winter): Antagonism, Conflictuality and Resilience: A New Model of Societal Radicalisation. Journal for Deradicalization, 21, 181-218. URL: http://journals.sfu.ca/jd/index.php/jd/article/ view/285 Eijkman, Quirine; Roodnat, Josien (2017, Spring): Beware of Branding Someone a Terrorist: Local Profession- als on Person-Specific Interventions to Counter Extremism.Journal for Deradicalization, 10, 175-202. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/87 El-Amraoui, Anaïs F.; Ducol, Benjamin (2019, Fall): Family-Oriented P/CVE Programs: Overview, Challenges and Future Directions. Journal for Deradicalization, 20, 190-231. URL: http://journals.sfu.ca/jd/index.php/jd/ article/view/255 Elshimi, Mohammed (2015): De-Radicalisation Interventions as Technologies of the Self: A Foucauldian Anal- ysis. Critical Studies on Terrorism, 8(1), 110-129. DOI: https://doi.org/10.1080/17539153.2015.1005933 Endres, Florian (2014): Die Beratungsstelle „Radikalisierung“ im Bundesamt für Migration und Flüchtlinge. JEX, 1 (2014), 1-12. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/53 Ernst, Julian et al. (2017, Spring): Hate Beneath the Counter Speech? A Qualitative Content Analysis of User Comments on YouTube Related to Counter Speech Videos. Journal for Deradicalization, 10, 1-49. URL: http:// journals.sfu.ca/jd/index.php/jd/article/view/91 Eroukhmanoff, Clara (2015): The Remote Securitisation of Islam in the US Post-9/11: Euphemisation, Met- aphors and the “Logic of Expected Consequences” in Counter-Radicalisation Discourse. Critical Studies on ISSN 2334-3745 106 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Terrorism, 8(2), 246-265. DOI: https://doi.org/10.1080/17539153.2015.1053747 URL: https://www.free-ex- pression.group.cam.ac.uk/pdfs/the-remote-securitisation-of-islam-in-the-us-post.pdf EXIT-Deutschland (2017): EXIT-Deutschland Botschafter und 20 Jahre Zentrum Demokratische Kultur.JEX , 5 (2017), 105-109. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/105 Falode, Adewunmi J. (2019): Hybrid Doctrine: The Grand Strategy for Counterinsurgency and Counterter- rorism Operations in Nigeria. Defence Against Terrorism Review, 11, 7-31. URL: http://www.coedat.nato.int/ publication/datr/volumes/Datr_Vol.11.pdf Farrall, (2015, Fall): Navigating Lived Experience: Reflections from the Field. Journal for Deradicalization, 4, 120-144. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/28 Feddes, Allard R.; Gallucci, Marcello (2015-2016, Winter): A Literature Review on Methodology Used in Eval- uating Effects of Preventive and De-Radicalisation Interventions.Journal for Deradicalization, 5, 1-27. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/33 Ferguson, Neil (2016, Spring): Disengaging from Terrorism: A Northern Irish Experience. Journal for Deradi- calization, 6, 1-23. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/41 Finn, Melissa et al. (2016, Summer): Youth Evaluations of CVE/PVE Programming in Kenya in Context. Jour- nal for Deradicalization, 7, 164-224. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/62 Fitzgerald, James (2016): Counter-Radicalisation Policy across Europe: An Interview with Maarten van de Donk (Radicalisation Awareness Network). Critical Studies on Terrorism, 9(1), 131-138. DOI: https://doi.org/1 0.1080/17539153.2016.1147770 Fraihi, Tarik (2011): (De-)Escalating Radicalisation: The Debate within Immigrant Communities in Europe. In: Rik Coolsaet (Ed.): Jihadi Terrorism and the Radicalisation Challenge: European and American Experiences. (2nd ed.). Farnham: Ashgate, 205-214. Franssens, Henrique (2015, Summer): Reducing the Risks Posed by Dutch Returnees from Syria by Transfer- ring Germany’s Experiences in their Fight against the Radical Right to the Netherlands. Journal for Deradical- ization, 3, 39-91. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/17 Frischlich, Lena et al. (2018): The Power of a Good Story: Narrative Persuasion in Extremist Propaganda and Videos against Violent Extremism. International Journal of Conflict and Violence, 12, Article a644. DOI: https:// doi.org/10.4119/UNIBI/ijcv.644 Georgi, Richard (2014): The Invocation of Human Rights and the (De-)Securitization of Ethno-Political Con- flicts.JEX , 2 (2014), 234-342. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/76 Georgiadou, Chara (2014): A De-Radicalization Strategy for Greece: Baby Steps Back to Social Common Sense. JEX, 2 (2014), 108-116. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/94 Gervasoni, Franz (2014): Couragierter agieren und reagieren – Ein Plädoyer für mehr Zivilgesellschaft im Kampf gegen den Rechtsextremismus aus bayrischer Perspektive. JEX, 1 (2014), 59-64. URL: http://journals. sfu.ca/jed/index.php/jex/article/view/56 Gielen, Amy-Jane (2015, Spring): Supporting Families of Foreign Fighters: A Realistic Approach for Measuring the Effectiveness. Journal for Deradicalization, 2, 21-48. URL: http://journals.sfu.ca/jd/index.php/jd/article/ view/10 Gielen, Amy-Jane (2018): Exit Programmes for Female Jihadists: A Proposal for Conducting Realistic Evaluation of the Dutch Approach. International Sociology, 33(4), 454-472. DOI: https://doi.org/10.1177/0268580918775586 Gielen, Amy-Jane; Dijkman, Annebregt (2019, Fall): Evidence-Based Informed Policy Design for Support Groups for Families of Foreign Fighters: Ex ante Application of Realistic Evaluation and Review. Journal for

ISSN 2334-3745 107 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Deradicalization, 20, 232-271. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/259 Gill, Paul; Bouhana, Noemie; Morrison, John (2015): Individual Disengagement from Terrorist Groups. In: Caroline Kennedy-Pipe; Gordon Clubb; Simon Mabon (Eds.): Terrorism and Political Violence. Los Angeles: SAGE, 243-257. Götsch, Katharina (2017, Fall): Austria and the Threats from Islamist Radicalisation and Terrorist Involvement: An Overview of Governmental and Non-Governmental Initiatives and Policies. Journal for Deradicalization, 12, 169-191. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/114 Griffith-Dickson, Gwen; Dickson, Andrew; Ivermee, Robert (2014-2015, Winter): Counter-Extremism and De-Radicalisation in the UK: A Contemporary Overview. Journal for Deradicalization, 1, 26-37. URL: http:// journals.sfu.ca/jd/index.php/jd/article/view/4 Gunaratna, Rohan (2017, June): Strategic Counter-Terrorism: A Game Changer in Fighting Terrorism? Count- er Terrorist Trends and Analyses, 9(6), 1-5. URL: https://www.rsis.edu.sg/wp-content/uploads/2017/06/CTTA_ June_2017.pdf Halafoff, Anna; Wright-Neville, David (2009): A Missing Peace? The Role of Religious Actors in Countering Terrorism. Studies in Conflict & Terrorism, 32(11), 921-932. DOI: https://doi.org/10.1080/10576100903262740 Hantscher, Sinja (2014): Externe Konflikte und islamistische Radikalisierung: Eine Analyse zum Einfluss des Bosnienkrieges auf die islamistischen Radikalisierungsprozesse in Deutschland. JEX, 2 (2014), 46-71. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/71 Hardy, Keiran (2018, Summer): Comparing Theories of Radicalisation with Countering Violent Extremism Policy. Journal for Deradicalization, 15, 76-110. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/150 Harris, K. J.; Gringart, E.; Drake, D. (2018): Leaving Ideological Groups Behind: A Model of Disengagement. Behavioral Sciences of Terrorism and Political Aggression, 10(2), 91-109. DOI: https://doi.org/10.1080/1943447 2.2017.1299782 Hartmann, Christina (2017-2018, Winter): Who Does (Not) Belong to the Jihadis’ umma? A Comparison of IS’s and al Qaida’s Use of Takfīr to Exclude People from the Muslim Community. Journal for Deradicalization, 13, 213-242. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/129 Hartung, Steven (2013): Ausstieg ohne EXIT? Ein Kommentar des Aktionskreis ehemaliger Rechtsextremisten / EXIT-Deutschland. JEX, 1 (2013), 17-19. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/5 Haugstvedt, Håvard (2019, Summer): Trusting the Mistrusted: Norwegian Social Workers’ Strategies in Pre- venting Radicalization and Violent Extremism. Journal for Deradicalization, 19, 149-184. URL: http://journals. sfu.ca/jd/index.php/jd/article/view/219 Heath-Kelly, Charlotte (2017): The Geography of Pre-Criminal Space: Epidemiological Imaginations of Rad- icalisation Risk in the UK Prevent Strategy, 2007–2017. Critical Studies on Terrorism, 10(2), 297-319. DOI: https://doi.org/10.1080/17539153.2017.1327141 Heath-Kelly, Charlotte (2018): Are Counter-Radicalisation Approaches an Effective Counterterrorist Tool? NO: A Suspect Counterterrorism “Science” that Ignores Economic Marginalisation, Foreign Policy and Ethics. In: Richard Jackson; Daniela Pisoiu (Eds.): Contemporary Debates on Terrorism. (2nd ed.). Abingdon: Rout- ledge, 217-223. Hedayat, Ali (2015, Spring): Politischer Islamismus und die internationale Politik: Die mobilisierende Rhetorik von Hizb ut-Tahrir. Journal for Deradicalization, 2, 49-85. URL: http://journals.sfu.ca/jd/index.php/jd/article/ view/11

ISSN 2334-3745 108 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Heinke, Daniel H. (2016): Countering Radicalization and Recruitment of so-called Jihadists – Proscription of Radicalization Hubs. Defence Against Terrorism Review, 8, 89-97. URL: http://www.coedat.nato.int/publica- tion/datr/volume8-2016/05-Countering_Radicalization_and_Recruitment.pdf Heisterkamp, Lucia (2017-2018, Winter): „Denn du gehst gleich ein in ewige Gärten.“ Zum Zusammenhang zwischen transzendenter Weltanschauung und Gewaltbegründung. Journal for Deradicalization, 13, 137-177. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/126 Hellmuth, Dorle (2015): Countering Jihadi Terrorists and Radicals the French Way. Studies in Conflict & Ter- rorism, 38(12), 979-997. DOI: https://doi.org/10.1080/1057610X.2015.1076277 Hellmuth, Dorle (2015, Fall): Countering Jihadi Radicals and Foreign Fighters in the United States and France: Très Similaire. Journal for Deradicalization, 4, 1-43. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/24 Hellmuth, Dorle (2016, Spring): Of Alienation, Association, and Adventure: Why German Fighters Join ISIL. Journal for Deradicalization, 6, 24-50. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/42 Hettiarachchi, Malkanthi (2018): Rehabilitation to Deradicalise Detainees and Inmates: A Counter-Terrorism Strategy. Journal of Policing, Intelligence and Counter Terrorism, 13(2), 267-283. DOI: https://doi.org/10.1080/ 18335330.2018.1476774 Hettiarachchi, Malkanthi (2019): Deradicalization of Terrorist Detainees and Inmates: A Soft Approach to Counter Terrorism. In: Benjamin Schreer; Andrew T. H. Tan (Eds.): Terrorism and Insurgency in Asia: A Con- temporary Examination of Terrorist and Separatist Movements. (Europa Regional Perspectives). Abingdon: Routledge, 214-230. Hjørnholm, Morten (2013): Militant Extremism in a Preventive Perspective. JEX, 2 (2013), 54-68. URL: http:// journals.sfu.ca/jed/index.php/jex/article/view/20 Horgan, John (2008, February): Deradicalization or Disengagement? A Process in Need of Clarity and a Coun- terterrorism Initiative in Need of Evaluation. Perspectives on Terrorism, 2(4), 3-8. URL: https://www.universi- teitleiden.nl/binaries/content/assets/customsites/perspectives-on-terrorism/2008/issue-4/32-198-1-pb.pdf Horgan, John (2014-2015, Winter): What Makes a Terrorist Stop Being a Terrorist? Journal for Deradicalization [in cooperation with The Conversation], 1, 1-4. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/1 Horgan, John; Altier, Mary Beth (2012, Summer-Fall): The Future of Terrorist De-Radicalization Programs. Georgetown Journal of International Affairs, 13(2), 83-90. Horgan, John; Taylor, Max (2011): Disengagement, De-Radicalization, and the Arc of Terrorism: Future Di- rections for Research. In: Rik Coolsaet (Ed.): Jihadi Terrorism and the Radicalisation Challenge: European and American Experiences. (2nd ed.). Farnham: Ashgate, 173-186. Horgan, John et al. (2017): Walking Away: The Disengagement and De-Radicalization of a Violent Right-Wing Extremist. Behavioral Sciences of Terrorism and Political Aggression, 9(2), 63-77. DOI: https://doi.org/10.1080/ 19434472.2016.1156722 Howard, Tiffiany; Poston, Brach; Benning, Stephen D. (2019, Summer): The Neurocognitive Process of Digi- tal Radicalization: A Theoretical Model and Analytical Framework. Journal for Deradicalization, 19, 122-146. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/217 Hussain, Sabrina (2018, Spring): Exploring People’s Perceptions of Precursors to the Development of Radical- isation and Extremism. Journal for Deradicalization, 14, 79-110. URL: http://journals.sfu.ca/jd/index.php/jd/ article/view/136 Irwin, Nathan (2015): The Complexity of Responding to Home-Grown Terrorism: Radicalisation, De-Rad- icalisation and Disengagement. Journal of Policing, Intelligence and Counter Terrorism, 10(2), 166-175. DOI: https://doi.org/10.1080/18335330.2015.1089639 ISSN 2334-3745 109 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Islam, Didarul (2019, May): De-Radicalisation of Terrorists: Theoretical Analysis and Case Studies.Counter Terrorist Trends and Analyses, 11(5), 6-12. URL: https://www.rsis.edu.sg/wp-content/uploads/2019/05/CT- TA-May-2019.pdf Jacoby, Tami Amanda (2016, Spring): How the War Was “One”: Countering Violent Extremism and the Social Dimensions of Counter-Terrorism in Canada. Journal for Deradicalization, 6, 272-304. URL: http://journals. sfu.ca/jd/index.php/jd/article/view/50 Jamal, Bahija (2018, November): Moroccan Counter-Terrorism Policy: Case of Moroccan Female Migrants to ISIS. International Annals of Criminology, 56(1-2), 145-156. DOI: https://doi.org/10.1017/cri.2018.12 Jankowsky, Alexander (2014): Exit Crime – Zur Übertragbarkeit eines Aussteigerprogramms für Rechtsex- treme auf die kriminelle Rockerszene in Deutschland. JEX, 1 (2014), 97-176. URL: http://journals.sfu.ca/jed/ index.php/jex/article/view/58 JEX Service (2015): JEX Service: KDR Kompetenzstelle Deradikalisierung. JEX, 1 (2015), 175-177. URL: http:// journals.sfu.ca/jed/index.php/jex/article/view/118 Jiries, Tanja Dramac (2016, Spring): Rise of Radicalization in the Global Village: Online Radicalization vs. In-Person Radicalization – Is there a Difference? Journal for Deradicalization, 6, 206-230. URL: http://journals. sfu.ca/jd/index.php/jd/article/view/48 Jones, Clarke R.; Morales, Resurrecion S. (2012): Integration versus Segregation: A Preliminary Examination of Philippine Correctional Facilities for De-Radicalization. Studies in Conflict & Terrorism, 35(3), 211-228. DOI: https://doi.org/10.1080/1057610X.2012.648157 Jones, Daniel (2015, Summer): The Searchlight Archive Collection at the University of Northampton: A Re- search Note. Journal for Deradicalization, 3, 210-215. URL: http://journals.sfu.ca/jd/index.php/jd/article/ view/22 Jongman, Albert (2009): Radicalisation and Deradicalisation: Dutch Experiences. In: Thomas M. Pick; Anne Speckhard; Beatrice Jacuch (Eds.): Home-Grown Terrorism: Understanding and Addressing the Root Causes of Radicalisation among Groups with an Immigrant Heritage in Europe. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 60). Amsterdam: IOS Press, 32-50. DOI: https://doi.org/10.3233/978- 1-60750-075-9-32 URL: https://pdfs.semanticscholar.org/bbd8/ffe6cfc6ff8ea854aa6841041534c0314b24.pdf Josefsson, Tommy; Nilsson, Marco; Borell, Klas (2017): Muslims Opposing Violent Radicalism and Extrem- ism: Strategies of Swedish Sufi Communities.Journal of Muslim Minority Affairs, 37(2), 183-195. DOI: https:// doi.org/10.1080/13602004.2017.1339498 Jurczyszynm, Lukasz (2015, Fall): “Respect – Diversity Football Unites” UEFA/FARE Program at EURO 2012 in Poland and Ukraine: Between Pro-Diversity Project and Security Policy towards Far-Right Groups. Journal for Deradicalization, 4, 226-255. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/31 Kamaruddin, Mohd Norzikri; Noordin, Noor Nirwandy Mat; Abd Rahman, Abd Rasid (2017, December): Terrorist Deradicalisation Programme in Malaysia: A Case Study. Journal of Media and Information Warfare, 10, 25-49. URL: http://www.myjurnal.my/public/article-view.php?id=112288 Kana, Rozila; Dore, Rupert (2014-2015, Winter): Countering Radicalisation Across Europe – The Pioneer- ing ISDEP Project. Journal for Deradicalization, 1, 23-25. URL: http://journals.sfu.ca/jd/index.php/jd/article/ view/3 Karpantschof, René (2015): Violence that Matters! Radicalization and De-Radicalization of Leftist, Urban Movements – Denmark 1981–2011. Behavioral Sciences of Terrorism and Political Aggression, 7(1), 35-52. DOI: https://doi.org/10.1080/19434472.2014.977330

ISSN 2334-3745 110 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Käsehage, Nina (2017, February): De-Radicalising Militant Salafists. Perspectives on Terrorism, 11(1), 77-79. URL: https://www.universiteitleiden.nl/binaries/content/assets/customsites/perspectives-on-terrorism/2017/ issue-1/0820171-de-radicalising-militant-salafists-by-nina-kasehage.pdf Kaya, Zeynep (2016, Spring): Letting Go: De-Radicalization in Egypt. Journal for Deradicalization, 6, 87-104. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/44 Kazi, Tehmina (2013): The Kenya Attacks: A Commentary from “British Muslims for Secular Democracy”. JEX, 2 (2013), 86-89. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/23 Kfir, (2017): Al-Shabaab, Social Identity Group, Human (In)Security, and Counterterrorism.Studies in Conflict & Terrorism, 40(9), 772-789. DOI: https://doi.org/10.1080/1057610X.2016.1236569 Khalil, James; Zeuthen, Martine (2016): Countering Violent Extremism: A Guide to Programme Design. In: Sara Zeiger (Ed.): Expanding Research on Countering Violent Extremism. Abu Dhabi / Perth: Hedayah / Edith Cowan University, 17-27. URL: https://www.hedayahcenter.org/resources/reports_and_publications/expand- ing-research-on-cve Kiefer, Maximilian et al. (2016-2017, Winter): Westliche Jugendliche im Bann des Islamischen Staates: Ra- dikalisierende Inhalte der IS-Propaganda am Beispiel der Onlinemagazine Dabiq und Rumiyah. Journal for Deradicalization, 9, 126-184. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/75 Kober, Marcus (2017, Summer): Zur Evaluation von Maßnahmen der Prävention von religiöser Radikalis- ierung in Deutschland. Journal for Deradicalization, 11, 219-257. URL: http://journals.sfu.ca/jd/index.php/jd/ article/view/105 Köhler, Daniel (2013): Family Counselling as Prevention and Intervention Tool against “Foreign Fighters”: The German “Hayat” Program. JEX, 3 (2013), 182-204. URL: http://journals.sfu.ca/jed/index.php/jex/article/ view/49 Köhler, Daniel (2013): Über die Notwendigkeit einer deutschen Deradikalisierungsforschung und die entspre- chenden Grundlagen. JEX, 1 (2013), 20-40. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/7 Köhler, Daniel (2014): Conference Report: “The Psychology of Crime-Related Radicalization” May 8-9 2014 in Trier. JEX, 3 (2014), 149-150. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/96 Köhler, Daniel (2014): Grundlegende Qualitätsstandards in der Angehörigenberatung als Teilbereich der De- radikalisierungsarbeit. JEX, 3 (2014), 226-244. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/102 Köhler, Daniel (2014): Right-Wing Extremist Radicalization Processes: The Formers’ Perspective. JEX, 1 (2014), 307-377. Köhler, Daniel (2014-2015, Winter): The Radical Online: Individual Radicalization Processes and the Role of the Internet. Journal for Deradicalization, 1, 116-134. URL: http://journals.sfu.ca/jd/index.php/jd/article/ view/8 Köhler, Daniel (2015): De-Radicalization and Disengagement Programs as Counter-Terrorism and Prevention Tools: Insights from Field Experiences Regarding German Right-Wing Extremism and Jihadism. In: Marco Lombardi et al. (Eds.): Countering Radicalisation and Violent Extremism among Youth to Prevent Terrorism. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 118). Amsterdam: IOS Press, 120-150. DOI: https://doi.org/10.3233/978-1-61499-470-1-120 Köhler, Daniel (2015, December): Radical Groups’ Social Pressure towards Defectors: The Case of Right-Wing Extremist Groups. Perspectives on Terrorism, 9(6), 36-50. URL: https://www.universiteitleiden.nl/binaries/con- tent/assets/customsites/perspectives-on-terrorism/2015/volume-6/3-radical-groups%E2%80%99-social-pres- sure-towards-defectors.-the-case-of-right-wing-extremist-groups-by-daniel-koehler.pdf

ISSN 2334-3745 111 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Köhler, Daniel (2018): Are Counter-Radicalisation Approaches an Effective Counterterrorist Tool? YES: An Effective Counterterrorism Tool. In: Richard Jackson; Daniela Pisoiu (Eds.): Contemporary Debates on Terror- ism. (2nd ed.). Abingdon: Routledge, 211-216. Köhler, Daniel (Interviewee); Daniel, Isabelle (Interviewer) (2013): „Ideologie bewirkt Verhalten“ – Ein Inter- view mit Daniel Köhler. JEX, 3 (2013), 58-71. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/44 Köhler, Daniel; Ehrt, Tobias (2018, November): Parents’ Associations, Support Group Interventions and Coun- tering Violent Extremism: An Important Step Forward in Combating Violent Radicalization. International Annals of Criminology, 56(1-2), 178-197. DOI: https://doi.org/10.1017/cri.2018.8 Köhler, Daniel; Fiebig, Verena (2019, June): Knowing What to Do: Academic and Practitioner Understanding of How to Counter Violent Radicalization. Perspectives on Terrorism, 13(3), 44-62. URL: https://www.univer- siteitleiden.nl/binaries/content/assets/customsites/perspectives-on-terrorism/2019/issue-3/04---koehler-and- fiebig.pdf Köhler, Daniel; Popella, Peter (2019, June): Getting off: The Implications of Substance Abuse and Mental Health Issues among Former ISIS Fighters for Counterterrorism and Deradicalization. Small Wars Journal 6 (2019). URL: https://smallwarsjournal.com/jrnl/art/getting-implications-substance-abuse-and-mental-health-issues- among-former-isis-fighters Kolbe, Henriette (2013): Ausstieg aus dem Rechtsextremismus: Eine qualitative Untersuchung von Fotogra- fien.JEX , 3 (2013), 205-252. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/48 Korn, Judy (2016, November): European CVE Strategies from a Practitioner’s Perspective. The AN- NALS of the American Academy of Political and Social Science, 668(1), 180-197. DOI: https://doi. org/10.1177/0002716216671888 Korn, Judy; Brammann, Alexander (2015): Violence Prevention Network: A Description of Best Practices for Successful Deradicalization Programs. Per Concordiam, 6(4), 26-29. URL: https://www.marshallcenter.org/mc- publicweb/mcdocs/files/College/F_Publications/perConcordiam/pC_V6N4_en.pdf Kruglanski, Arie W.; Bélanger, Jocelyn J.; Gunaratna, Rohan (2019): The Deradicalization Process. In:The Three Pillars of Radicalization: Needs, Narratives, and Networks. New York: Oxford University Press, 139-172. Kruglanski, Arie W. et al. (2014, February): The Psychology of Radicalization and Deradicalization: How Sig- nificance Quest Impacts Violent Extremism.Political Psychology, 35(S1), 69-93. DOI: https://doi.org/10.1111/ pops.12163 Kühle, Lene (2018, June): Policies of Radicalisation as Anti- and Countercult Ideologies. Journal of Muslims in Europe, 7(2), 211-236. DOI: https://doi.org/10.1163/22117954-12341367 Kundnani, Arun (2012, October-December): Radicalisation: The Journey of a Concept. Race & Class, 54(2), 3-25. DOI: https://doi.org/10.1177/0306396812454984 Kutner, Samantha (2016, Summer): The Call for Component Analyses of the Saudi Arabian Risk Reduction Initiative: An Examination of Religious Re-Education’s Role in the Deradicalization and Disengagement Pro- cess. Journal for Deradicalization, 7, 107-123. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/59 Lambert, Robert (2011): Competing Counter-Radicalisation Models in the UK. In: Rik Coolsaet (Ed.): Jihadi Terrorism and the Radicalisation Challenge: European and American Experiences. (2nd ed.). Farnham: Ashgate, 215-226. Lamberty, Pia (2013): Methodologische Schwierigkeiten und Herausforderungen einer quantitativen Radi- kalisierungsforschung am Beispiel des Rechtsextremismus: Ein Über- und Ausblick. JEX, 3 (2013), 115-181. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/46

ISSN 2334-3745 112 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

La Palm, Marita (2017, Fall): Re-Purposing the Push-Pull Model to Describe Signature Patterns of Terrorist Disengagement by Group: A Validation Study. Journal for Deradicalization, 12, 85-118. URL: http://journals. sfu.ca/jd/index.php/jd/article/view/112 Lavut, Lea (2016, Fall): Building Partnerships towards a Democratic Police Force in the Post-Revolutionary Tunisia Context. Journal for Deradicalization, 8, 100-152. URL: http://journals.sfu.ca/jd/index.php/jd/article/ view/67 Leimbach, Katharina (2017, Summer): Die (De-)Konstruktion eines extremistischen Weltbildes: Eine Mixed-Methods Analyse von Al-Qaidas Online Magazin “Inspire”. Journal for Deradicalization, 11, 148-218. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/104 Letsch, Lydia (2018-2019, Winter): Countering Violent Extremism in Tunisia – Between Dependency and Self-Reliance. Journal for Deradicalization, 17, 163-195. URL: http://journals.sfu.ca/jd/index.php/jd/article/ view/178 Lewis, James (2018, Summer): Prevent as an Intractable Policy Controversy: Implications and Solutions. Jour- nal for Deradicalization, 15, 111-150. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/151 Linea, Ava; Dantschke, Claudia (2016): Systemische Deradikalisierungsarbeit am Beispiel der Initiative HA- YAT-Deutschland. JEX, 3 (2016), 4-11. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/138 Lindekilde, Lasse (2016): Radicalization, De-Radicalization, and Counter-Radicalization. In: Richard Jackson (Ed.): Routledge Handbook of Critical Terrorism Studies. (Routledge Handbooks). Abingdon: Routledge, 248- 260. Logvinov, Michail (2018): Politisch motivierte Kriminalität als Abnormitätsfunktion? Erkenntnisse aus der Rechtsextremismus- und Islamismusforschung. JEX, 7 (2018), 34-56. URL: http://journals.sfu.ca/jed/index. php/jex/article/view/31 Lowry, Kevin D. (2018-2019, Winter): Responding to the Challenges of Violent Extremism/Terrorism Cases for United States Probation and Pretrial Services. Journal for Deradicalization, 17, 28-88. URL: http://journals. sfu.ca/jd/index.php/jd/article/view/178 Macnair, Logan; Frank, Richard (2017, Spring): Voices Against Extremism: A Case Study of a Communi- ty-Based CVE Counter-Narrative Campaign. Journal for Deradicalization, 10, 147-174. URL: http://journals. sfu.ca/jd/index.php/jd/article/view/86 Malmström, Cecilia (2013): EU Versus Extremism: Europe Must Respond to the Threat of Radicalisation, before it Turns Even More Violent. JEX, 2 (2013), 1-3. URL: http://journals.sfu.ca/jed/index.php/jex/article/ view/17 Manning, Lauren (2018): It Wasn’t Enough for Me to Physically Remove Myself. JEX, 7 (2018), 68-72. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/68 Mansour, Ahmad (2013): Mum, I’m Fighting for Allah now. JEX, 3 (2013), 24-28. URL: http://journals.sfu.ca/ jed/index.php/jex/article/view/38 Mansour, Ahmad (2016): Vom Wunsch, Prinzessin zu sein. Helena aus Bremen. [Book Excerpt]. JEX, 3 (2016), 12-19. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/139 Marret, Jean-Luc et al. (2013): An Overview of the SAFIRE Project: A Scientific Approach to Finding Indica- tors and Responses to Radicalisation. JEX, 2 (2013), 123-148. URL: http://journals.sfu.ca/jed/index.php/jex/ article/view/26 Marsden, Sarah (2015): How Terrorism Ends. In: Caroline Kennedy-Pipe; Gordon Clubb; Simon Mabon (Eds.): Terrorism and Political Violence. Los Angeles: SAGE, 199-225.

ISSN 2334-3745 113 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Marsden, Sarah (2018): Reintegrating Radicals: A Strengths-Based Approach to Deradicalisation. In: Orla Lynch; Javier Argomaniz (Eds.): Victims and Perpetrators of Terrorism: Exploring Identities, Roles and Narra- tives. (Contemporary Terrorism Studies). Abingdon: Routledge, 149-164. URL: https://eprints.lancs.ac.uk/id/ eprint/88067 Martin, Thomas (2018, August): Identifying Potential Terrorists: Visuality, Security and the Channel Project. Security Dialogue, 49(4), 254-271. DOI: https://doi.org/10.1177/0967010618770070 URL: http://sro.sussex. ac.uk/id/eprint/74417 Martins, Bruno Oliveira; Ziegler, Monika (2017): Counter-Radicalization as Counter-Terrorism: The European Union Case. In: Kristian Steiner; Andreas Önnerfors (Eds.): Expressions of Radicalization: Global Politics, Pro- cesses and Practices. Cham: Palgrave Macmillan / Springer Nature, 321-352. DOI: https://doi.org/10.1007/978- 3-319-65566-6_12 Mattsson, Christer; Johansson, Thomas (2018, Fall): Becoming, Belonging and Leaving – Exit Processes among Young Neo-Nazis in Sweden. Journal for Deradicalization, 16, 34-69. URL: http://journals.sfu.ca/jd/index.php/ jd/article/view/161 Mattsson, Christer; Johansson, Thomas (2019, Spring): Leaving Hate Behind – Neo-Nazis, Significant Others and Disengagement. Journal for Deradicalization, 18, 185-216. URL: http://journals.sfu.ca/jd/index.php/jd/ar- ticle/view/193 Maurer, Thomas (2017-2018, Winter): Die Pluralität der Radikalisierung – Eine systematische Analyse der Theorieansätze zur Radikalisierungsforschung.Journal for Deradicalization, 13, 49-100. URL: http://journals. sfu.ca/jd/index.php/jd/article/view/124 McCauley, Clark (2011): Group Desistance from Terrorism: The Dynamics of Actors, Actions and Outcomes. In: Rik Coolsaet (Ed.): Jihadi Terrorism and the Radicalisation Challenge: European and American Experiences. (2nd ed.). Farnham: Ashgate, 187-204. McCauley, Clark; Moskalenko, Sophia (2017, April): Understanding Political Radicalization: The Two-Pyra- mids Model. American Psychologist, 72(3), 205-216. DOI: https://doi.org/10.1037/amp0000062 McDowell-Smith, Allison; Speckhard, Anne; Yayla, Ahmet S. (2017, Spring): Beating ISIS in the Digital Space: Focus Testing ISIS Defector Counter-Narrative Videos with American College Students. Journal for Deradical- ization, 10, 50-76. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/83 Miller, Allison D. (2018, Summer): Community Cohesion and Countering Violent Extremism: Interfaith Ac- tivism and Policing Methods in Metro Detroit. Journal for Deradicalization, 15, 197-233. URL: http://journals. sfu.ca/jd/index.php/jd/article/view/153 Mink, Charles (2015-2016, Winter): It’s About the Group, Not God: Social Causes and Cures for Terrorism. Journal for Deradicalization, 5, 63-91. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/35 Mitchell, Stefanie (2016-2017, Winter): Deradicalization: Using Triggers for the Development of a US Pro- gram. Journal for Deradicalization, 9, 101-125. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/74 Mojtahedi, Mohammad Hossein; van Wijk, Joris (2019-2020): The Promotion of Secularization as a Counter- terrorism Strategy to Religious Terrorism: A Case Study of Iraq. Journal for Deradicalization, 21, 144-180. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/283 Molau, Andreas (2016): Radikalisierung und Erosion der politischen Mitte durch freiheitsfeindliche und kollek- tivistische Ideologien. JEX, 2 (2016), 109-118. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/131 Morier, Florian (2019-2020, Winter): Program Insight: The Screening Process of Disengaged Boko Haram As- sociates in Niger. Journal for Deradicalization, 21, 117-143. URL: http://journals.sfu.ca/jd/index.php/jd/article/ view/281

ISSN 2334-3745 114 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Msall, Kyle A. (2017, Spring): Perceptions of Extremists and Deradicalization Programs among University Students in Kuwait. Journal for Deradicalization, 10, 77-97. URL: http://journals.sfu.ca/jd/index.php/jd/article/ view/84 Mucha, Witold (2014): The State’s Muscles: Radicalization and De-Radicalization of Violence in Egypt, Libya and Syria. JEX, 2 (2014), 104-138. Mucha, Witold (2017, Spring): Polarization, Stigmatization, Radicalization: Counterterrorism and Homeland Security in France and Germany. Journal for Deradicalization, 10, 230-254. URL: http://journals.sfu.ca/jd/in- dex.php/jd/article/view/89 Muhanna-Matar, Aitemad (2017): The Limit-Experience and Self-Deradicalisation: The Example of Radical Salafi Youth in Tunisia.Critical Studies on Terrorism, 10(3), 453-475. DOI: https://doi.org/10.1080/17539153. 2017.1304747 Mühlhausen, Anna (2016-2017, Winter): Conflict Management, Transitional Justice and De-Radicalization – Different, but Common Goals. Journal for Deradicalization, 9, 260-291. URL: http://journals.sfu.ca/jd/index. php/jd/article/view/78 Muluk, Hamdi; Umam, Ahmad Naufalul; Milla, Mirra Noor (2019, November): Insights from a Deradicaliza- tion Program in Indonesian Prisons: The Potential Benefits of Psychological Intervention Prior to Ideologi- cal Discussion. Asian Journal of Social Psychology. Advance Online Publication. DOI: https://doi.org/10.1111/ ajsp.12392 Musial, Julia (2016-2017, Winter): “My Muslim Sister, Indeed You Are a Mujahidah” – Narratives in the Pro- paganda of the Islamic State to Address and Radicalize Western Women: An Exemplary Analysis of the Online Magazine Dabiq. Journal for Deradicalization, 9, 39-100. URL: http://journals.sfu.ca/jd/index.php/jd/article/ view/73 Mutch, Stephen B. (2018): From Deprogramming to Deradicalization: How Cultic Studies Offers Insights for Subject-Diversion Programs and Suggests Pathways for Complaint about Religious and Ideologically Moti- vated Abuse in Australia. International Journal of Cultic Studies, 9, 31-42. URL: https://www.icsahome.com/ articles/from-deprogramming-to-deradicalization-docx Neumann, Katharina (2014-2015, Winter): Rechtsextreme links liegen lassen? Eine Einschätzung von Szene- aussteigern zu Medieneffekten innerhalb der rechtsextremen Szene. Journal for Deradicalization, 1, 38-65. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/5 Neumann, Katharina (2015): Zwischen NS-Propaganda und Facebook: Eine Analyse der Nutzung und Rel- evanz von Massenmedien und internen Medien innerhalb der rechtsextremen Szene in Deutschland. JEX, 1 (2015), 71-90. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/109 Neumann, Katharina; Baugut, Philip (2016): „Wir sind im permanenten Kriegszustand“: Medienwirkungen auf Rechtsextreme. JEX, 4 (2016), 5-27. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/154 Neumann, Peter R. (2013): Options and Strategies for Countering Online Radicalization in the United States. Studies in Conflict & Terrorism, 36(6), 431-459. DOI: https://doi.org/10.1080/1057610X.2013.784568 URL: https://counterideology2.files.wordpress.com/2013/06/options-n-strategies-for-countering-online-radicaliza- tion-in-the-us.pdf Nitsch, Holger; Irani, Dominik (2017): Prevention, Anti-Radicalisation and the Role of Social Media: A View from Germany. In: Maura Conway et al. (Eds.): Terrorists’ Use of the Internet: Assessment and Response. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 136). Amsterdam: IOS Press, 257-265. DOI: https://doi.org/10.3233/978-1-61499-765-8-257 Noonan, Michael; Khalil, Phyl (2014-2015, Winter): North American Foreign Fighters. Journal for Deradical- ization, 1, 66-96. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/6 ISSN 2334-3745 115 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Noricks, Darcy M. E. (2009): Disengagement and Deradicalization: Processes and Programs. In: Paul K. Davis; Kim Cragin (Eds.): Social Science for Counterterrorism: Putting the Pieces Together. [e-Book]. Santa Monica: RAND Corporation, 299-321. DOI: https://doi.org/10.7249/MG849 Obajeun, Jonah Ayodele (2016): Radicalization Drivers and De-Radicalization Process: The Case of Tolerance Academy in Nigeria. In: Sara Zeiger (Ed.): Expanding Research on Countering Violent Extremism. Abu Dhabi / Perth: Hedayah / Edith Cowan University, 117-126. URL: https://www.hedayahcenter.org/resources/reports_ and_publications/expanding-research-on-cve Odağ, Özen; Leiser, Anne; Boehnke, Klaus (2019-2020, Winter): Reviewing the Role of the Internet in Rad- icalization Processes. Journal for Deradicalization, 21, 261-300. URL: http://journals.sfu.ca/jd/index.php/jd/ article/view/289 Ohl, Jonas (2017, Fall): “Sein oder Nichtsein”: Zur Konstruktion muslimischer Identität im IS-Journal - yah. Journal for Deradicalization, 12, 269-308. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/118 Ördén, Hedvig (2018): Instilling Judgement: Counter-Narratives of Humour, Fact and Logic. Critical Studies on Security, 6(1), 15-32. DOI: https://doi.org/10.1080/21624887.2017.1377593 Ostwaldt, Jens (2018, Spring): Closing the “Critical Disconnect“: The Establishment of Regional Prevention Networks at the Interface of Prevention and Deradicalisation Work Using the Example of the Federal State Democracy Centre Baden-Wuerttemberg. Journal for Deradicalization, 14, 218-248. URL: http://journals.sfu. ca/jd/index.php/jd/article/view/140 Out, Rob (2013): CoPPRa: Community Policing and Prevention of Radicalisation. JEX, 2 (2013), 69-75. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/21 Palm, Niklas (2017, Spring): Radikalisierungsprozesse westlicher Dschihadisten: Eine Untersuchung am Beispiel Denis Cuspert. Journal for Deradicalization, 10, 98-146. URL: http://journals.sfu.ca/jd/index.php/jd/ article/view/85 Pašagić, Aleksandar (2019, Fall): Between Child Soldiers and Terrorists: Reintegrating Child Members of the Islamic State. Journal for Deradicalization, 20, 109-155. URL: http://journals.sfu.ca/jd/index.php/jd/article/ view/251 Peracha, Feriha N.; Khan, Rafia R.; Savage, Sara (2016): Sabaoon: Educational Methods Successfully Coun- tering and Preventing Violent Extremism. In: Sara Zeiger (Ed.): Expanding Research on Countering Violent Extremism. Abu Dhabi / Perth: Hedayah / Edith Cowan University, 85-104. URL: https://www.hedayahcenter. org/resources/reports_and_publications/expanding-research-on-cve Pereira, Ryan (2015, August): “Channeling”: The United Kingdom’s Approach to CVE – A Plan Ameri- cans Deserve but Will Never Receive. Small Wars Journal, 8/2016. URL: https://smallwarsjournal.com/jrnl/ art/%E2%80%9Cchanneling%E2%80%9D-the-united-kingdom%E2%80%99s-approach-to-cve-a-plan-amer- icans-deserve-but-will-never-r Pettinger, Tom (2015-2016, Winter): What is the Impact of Foreign Military Intervention on Radicalization? Journal for Deradicalization, 5, 92-119. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/36 Pettinger, Tom (2017, Fall): De-Radicalization and Counter-Radicalization: Valuable Tools Combating Violent Extremism, or Harmful Methods of Subjugation? Journal for Deradicalization, 12, 1-59. URL: http://journals. sfu.ca/jd/index.php/jd/article/view/109 Phelps, Matthew (2018): Breaking Down Perspectives on Counter-Radicalisation: A Critical Review of Termi- nology. Defence Against Terrorism Review, 10, 21-35. URL: http://www.coedat.nato.int/publication/datr/vol- umes/Datr_Vol.10.pdf

ISSN 2334-3745 116 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Pisoiu, Daniela (2013): Theoretische Ansätze zur Erklärung individueller Radikalisierungsprozesse: Eine kritische Beurteilung und Überblick der Kontroversen. JEX, 1 (2013), 41-87. Pisoiu, Daniela (2015, Spring): Subculture: The Third Wave of European Jihad. [Op-Ed.]. Journal for Deradical- ization, 2, 163-170. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/15 Pisoiu, Daniela; Hain, Sandra (2018): Individual Disengagement, De-Radicalization, and Counter-Radicaliza- tion. In: Theories of Terrorism: An Introduction. Abingdon: Routledge, 137-151. Pisoiu, Daniela; Köhler, Daniel (2013): Individuelle Loslösung von Radikalisierungsprozessen: Stand der Forschung und eine Überprüfung bestehender Theorien anhand eines Ausstiegsfalls aus dem militanten Salafismus.JEX , 2 (2013), 241-274. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/33 Pistone, Isabella et al. (2019, Summer): A Scoping Review of Interventions for Preventing and Countering Vi- olent Extremism: Current Status and Implications for Future Research. Journal for Deradicalization, 19, 1-84. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/213 Ponsot, Anne-Sophie; Autixier, Cateline; Madriaza, Pablo (2018, Fall): Factors Facilitating the Successful Im- plementation of a Prevention of Violent Radicalization Intervention as Identified by Front-Line Practitioners. Journal for Deradicalization, 16, 1-33. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/160 Porges, Marisa L. (2010): Deradicalisation, the Yemeni Way. Survival, 52(2), 27-33. DOI: https://doi. org/10.1080/00396331003764553 Powell, Lauren (2016, Fall): Counter-Productive Counter-Terrorism: How Is the Dysfunctional Discourse of Prevent Failing to Restrain Radicalisation? Journal for Deradicalization, 8, 46-99. URL: http://journals.sfu.ca/ jd/index.php/jd/article/view/66 Prentice, Sheryl et al. (2012, August): Differentiating Act from Ideology: Evidence from Messages for and against Violent Extremism. Negotiation and Conflict Management Research, 5(3), 289-306. DOI: https://doi. org/10.1111/j.1750-4716.2012.00103.x Prunckun, Henry; Whitford, Troy (2019): Deradicalization. In: Terrorism and Counterterrorism: A Comprehen- sive Introduction to Actors and Actions. Boulder: Lynne Rienner, 211-222. Quivooij, Romain (2016): The French Counter Radicalization Strategy. Defence Against Terrorism Review, 8, 67-88. URL: http://www.coedat.nato.int/publication/datr/volume8-2016/04-The_French_Counter_Radical- ization_Strategy.pdf Raets, Sigrid (2017-2018, Winter): The We in Me: Considering Terrorist Desistance from a Social Identity Per- spective. Journal for Deradicalization, 13, 1-28. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/122 Ragazzi, Francesco (2017, May): Countering Terrorism and Radicalisation: Securitising Social Policy? Critical Social Policy, 37(2), 163-179. DOI: https://doi.org/10.1177/0261018316683472 URL: https://openaccess.leide- nuniv.nl/handle/1887/50282 Rahimi, Sadeq; Graumans, Raissa (2015-2016, Winter): Reconsidering the Relationship between Integration and Radicalization. Journal for Deradicalization, 5, 28-62. URL: http://journals.sfu.ca/jd/index.php/jd/article/ view/34 Rahman, Mohammad Azizur (2016, Summer): The Forms and Ecologies of Islamist Militancy and Terror- ism in Bangladesh. Journal for Deradicalization, 7, 68-106. URL: http://journals.sfu.ca/jd/index.php/jd/article/ view/58 Raja, Usman (Interviewee); Cruickshank, Paul (Interviewer) (2015, July): An Interview with: Usman Raja. CTC Sentinel, 8(7), 12-14. URL: https://ctc.usma.edu/app/uploads/2015/07/CTCSentinel-Vol8Iss75.pdf

ISSN 2334-3745 117 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Ramakrishna, Kumar (2015): Countering Radical Islam in Southeast Asia: The Need to Confront the Func- tional and Ideological “Enabling Environment”. In: Paul J. Smith (Ed.): Terrorism and Violence in Southeast Asia: Transnational Challenges to States and Regional Stability. Abingdon: Routledge, 145-168. (Original work published 2005) Ramalingam, Vidhya (2014): Government Responses to Far-Right Extremism: Learning from 10 European States. JEX, 1 (2014), 258-293. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/62 Ravndal, Jacob Aasland (2013): Anders Behring Breivik’s Use of the Internet and Social Media. JEX, 2 (2013), 172-185. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/28 Ravndal, Jacob Aasland (2015, Summer): Thugs or Terrorists? A Typology of Right-Wing Terrorism and Vi- olence in Western Europe. Journal for Deradicalization, 3, 1-38. URL: http://journals.sfu.ca/jd/index.php/jd/ article/view/16 Regnér, Lucas (2014): The YouTube-Born Terrorist.JEX , 2 (2014), 139-189. URL: http://journals.sfu.ca/jed/ index.php/jex/article/view/74 Reidy, Ken (2018, Spring): Radicalization as a Vector: Exploring Non-Violent and Benevolent Processes of Radicalization. Journal for Deradicalization, 14, 249-294. URL: http://journals.sfu.ca/jd/index.php/jd/article/ view/141 Richards, Joanne (2017): Demobilising and Disengaging Violent Extremists: Towards a New UN Framework. Stability, 6(1), Article 14. DOI: https://doi.org/10.5334/sta.543 Richards, Joanne (2018): High Risk or Low Risk: Screening for Violent Extremists in DDR Programmes. Inter- national Peacekeeping, 25(3), 373-393. DOI: https://doi.org/10.1080/13533312.2018.1440177 Richardson, Cara; Berlouis, Katherine M.; Cameron, Paul A. (2017, Summer): Radicalisation of Young Adults in the Balkan States: Counter-Measures, Healthcare Provision, and Community Involvement. Journal for De- radicalization, 11, 87-111. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/102 Richardson, Cara; Cameron, Paul A.; Berlouis, Katherine M. (2017-2018, Winter): The Role of Sport in Derad- icalisation and Crime Diversion. Journal for Deradicalization, 13, 29-48. URL: http://journals.sfu.ca/jd/index. php/jd/article/view/123 Rieger, Diana; Frischlich, Lena; Bente, Gary (2017, Spring): Propaganda in an Insecure, Unstructured World: How Psychological Uncertainty and Authoritarian Attitudes Shape the Evaluation of Right-Wing Extremist Internet Propaganda. Journal for Deradicalization, 10, 203-229. URL: http://journals.sfu.ca/jd/index.php/jd/ article/view/88 Saiful Alam Shah Bin Sudiman, Muhammad (2017, Fall): Countering ISIS Call for Hijra (Emigration): A Re- view through the Lens of Maqāṣid Ash-Sharīʿah. Journal for Deradicalization, 12, 60-84. URL: http://journals. sfu.ca/jd/index.php/jd/article/view/110 San, Serdar (2018, December): Counter-Terrorism Policing Innovations in Turkey: A Case Study of Turkish National Police CVE Experiment. Policing and Society. Advance Online Publication. DOI: https://doi.org/10 .1080/10439463.2018.1561697 Sandford, Liam (2019, Summer): Exploring the Capabilities of Prevent in Addressing Radicalisation in Cyber- space within Higher Education. Journal for Deradicalization, 19, 259-285. URL: http://journals.sfu.ca/jd/index. php/jd/article/view/225 Sascha [Pseudonym] (Interviewee); D., Manuel [Pseudonym] (Interviewer) (2018): Interview mit Sascha vom Aktionskreis ehemaliger Extremisten / EXIT-Deutschland. JEX, 7 (2018), 73-77. URL: http://journals.sfu.ca/ jed/index.php/jex/article/view/73

ISSN 2334-3745 118 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Savoia, Elena et al. (2019-2020, Winter): Evaluation of a School Campaign to Reduce Hatred. Journal for De- radicalization, 21, 43-83. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/277 Scheffler, Maik (2017): AK-Exit: Eine Website als Chance für außen und innen. JEX, 5 (2017), 103-104. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/103 Schettler, Leon Valentin (2016): A Call for Recognition – On the Causes of Political Islamism in Western Eu- rope. JEX, 4 (2016), 48-75. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/152 Schmid, Achim (2016): Zum Umgang mit dem “Spiegelbild”. JEX, 2 (2016), 205-207. URL: http://journals.sfu. ca/jed/index.php/jex/article/view/135 Schmid, Achim (Interviewee); Wagner, Bernd (Interviewer) (2016): 10 Fragen an Achim Schmid. JEX, 2 (2016), 200-204. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/134 Schmid, Alex P. (2016, August): The Way Forward on Counter-Terrorism: Global Perspectives.Strathmore Law Journal, 2(1), 49-73. URL: https://icct.nl/wp-content/uploads/2016/09/ICCT-Schmid-The-way-forward- on-counter-terrorism-global-perspectives-August-2016.pdf Schmitz, Dominic Musa (Interviewee); Dantschke, Claudia (Interviewer) (2016): „Ich möchte ich sein“: Clau- dia Dantschke im Gespräch mit Dominic Musa Schmitz, auch genannt Musa Almani. JEX, 3 (2016), 20-33. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/140 Schuurman, Bart; Bakker, Edwin (2016): Reintegrating Jihadist Extremists: Evaluating a Dutch Initiative, 2013- 2014. Behavioral Sciences of Terrorism and Political Aggression, 8(1), 66-85. DOI: https://doi.org/10.1080/1943 4472.2015.1100648 See, Sylvene (2018, June): Returning Foreign Terrorist Fighters: A Catalyst for Recidivism among Disengaged Terrorists. Counter Terrorist Trends and Analyses, 10(6), 7-15. URL: https://www.rsis.edu.sg/wp-content/up- loads/2018/06/CTTA-June-2018.pdf Seib, Anna (2018, Summer): Wilayat al-Qawkaz – The Islamic State in the North Caucasus: Frames, Strategies and Credibility of Radical Islamist Propaganda Videos. Journal for Deradicalization, 15, 151-196. URL: http:// journals.sfu.ca/jd/index.php/jd/article/view/152 Selber, Major William (2018): A Question of “Government” Control: Afghanistan DDR Programs since 2001. Small Wars & Insurgencies, 29(2), 344-366. DOI: https://doi.org/10.1080/09592318.2018.1433514 Sharma, Kunaal (2016): Experimental Methods for CVE: Countering Extremism via Elite Persuasion in In- dia. In: Sara Zeiger (Ed.): Expanding Research on Countering Violent Extremism. Abu Dhabi / Perth: Hedayah / Edith Cowan University, 29-39. URL: https://www.hedayahcenter.org/resources/reports_and_publications/ expanding-research-on-cve Shashaa, Abu Adam Hesham (Interviewee); Dantschke, Claudia (Interviewer) (2014): „I am the Opposite of Osama bin Laden“: A Conversation between Claudia Dantschke and Imam Abu Adam Hesham Shashaa about Salafism in Germany, the War in Syria and Questions of Reradicalization and Deradicalization of Adolescents. JEX, 1 (2014), 1-17. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/89 Shavit, Uriya; Andresen, Sören (2016, Fall): Can Western Muslims Be De-Radicalized? Middle East Quarterly, 23(4). URL: https://www.meforum.org/middle-east-quarterly/pdfs/6272.pdf Shi, Priscilla (2016): A Supplementary Intervention to Deradicalisation: CBT-Based Online Forum. In: Majeed Khader et al. (Eds.): Combating Violent Extremism and Radicalization in the Digital Era. Hershey: IGI Global, 410-424. DOI: https://doi.org/10.4018/978-1-5225-0156-5.ch020 Sieckelinck, Stijn et al. (2019): Transitional Journeys into and out of Extremism: A Biographical Approach. Studies in Conflict & Terrorism, 42(7), 662-682. DOI: https://doi.org/10.1080/1057610X.2017.1407075

ISSN 2334-3745 119 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Sikkens, Elga et al. (2017, Fall): Parental Influence on Radicalization and De-Radicalization according to the Lived Experiences of Former Extremists and their Families. Journal for Deradicalization, 12, 192-226. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/115 Silke, Andrew; Veldhuis, Tinka (2017, October): Countering Violent Extremism in Prisons: A Review of Key Recent Research and Critical Research Gaps. Perspectives on Terrorism, 11(5), 2-11. URL: https://www.uni- versiteitleiden.nl/binaries/content/assets/customsites/perspectives-on-terrorism/2017/issue-5/0220175-coun- tering-violent-extremism-in-prisons-a-review-of-key-recent-research-and-critical-research-gaps-by-andrew- silke-and-tinka-veldhuis.pdf Silva, Derek M. D. (2018, April): “Radicalisation: The Journey of a Concept”, Revisited. Race & Class, 59(4), 34- 53. DOI: https://doi.org/10.1177/0306396817750778 Sinai, Joshua (2016, June): A Framework for Assessing the Mobilization of Westerners by Jihadists in Syria and Intervention Points for Counter-Measures. Perspectives on Terrorism, 10(3), 45-52. URL: https://www.uni- versiteitleiden.nl/binaries/content/assets/customsites/perspectives-on-terrorism/2016/issue-3/307-a-frame- work-for-assessing-the-mobilization-of-westerners-by-jihadists-in-syria-and-intervention-points-for-count- er-measures-by-joshua-sinai.pdf Sinai, Joshua (2017, Summer): A Model for Countering Violent Extremism and Promoting Disengagement from Terrorism. The Journal of Counterterrorism & Homeland Security International, 23(2), 24-28. URL: https:// issuu.com/fusteros/docs/iacsp_magazine_v23n2_issuu Sinai, Joshua; with Jeffrey Fuller; Tiffany Seal (2019, December): Research Note: Effectiveness in Counter-Ter- rorism and Countering Violent Extremism: A Literature Review. Perspectives on Terrorism, 13(6), 90-108. URL: https://www.universiteitleiden.nl/binaries/content/assets/customsites/perspectives-on-terrorism/2019/ issue-6/07-sinai-research.pdf Sischka, Kerstin (2015): Auf dem Weg zu einem diagnostisch-therapeutischen Netzwerk Extremismus (DNE): Grundlagen für und Einblicke in ein Modellprojekt des Zentrum Demokratische Kultur. JEX, 1 (2015), 105- 126. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/112 Sivenbring, Jennie (2019, Spring): Signs of Concern about Islamic and Right-Wing Extremism on a Helpline against Radicalization. Journal for Deradicalization, 18, 108-145. URL: http://journals.sfu.ca/jd/index.php/jd/ article/view/189 Sjøen, Martin M. (2019, Fall): When Counterterrorism Enters the Curriculum: How the Global War on Terror Risks Impairing Good Education. Journal for Deradicalization, 20, 156-189. URL: http://journals.sfu.ca/jd/ index.php/jd/article/view/253 Skiple, Alida (2018, Spring): Youth Delinquency or Everyday Racism? Front-Line Professionals’ Perspectives on Preventing Racism and Intolerance in Sweden. Journal for Deradicalization, 14, 52-78. URL: http://journals. sfu.ca/jd/index.php/jd/article/view/135 Smith, Brent L. et al. (2015): The Emergence of Lone Wolf Terrorism: Patterns of Behavior and Implications for Intervention. In: Mathieu Deflem (Ed.): Terrorism and Counterterrorism Today. (Sociology of Crime, Law and Deviance, Vol. 20). Bingley: Emerald, 91-110. Sönmez, Göktuğ (2016, October): Do Turkey’s Counter-Extremism Efforts Offer Lessons for the West?Terror - ism Monitor, 14(21), 8-10. URL: https://jamestown.org/wp-content/uploads/2016/10/TM_Vol_14_Iss_21.pdf Sorge, Christoph (2016): AKTIONSKREIS: Freie Kräfte – Ein Leben für die Mission.JEX , 2 (2016), 190-199. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/133 Spalek, Basia; Davies, Lynn (2012): Mentoring in Relation to Violent Extremism: A Study of Role, Pur- pose, and Outcomes. Studies in Conflict & Terrorism, 35(5), 354-368. DOI: https://doi.org/10.1080/105761 0X.2012.666820 ISSN 2334-3745 120 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Speckhard, Anne (2009): The Militant Jihad in Europe: Fighting Home-Grown Terrorism. In: Thomas M. Pick; Anne Speckhard; Beatrice Jacuch (Eds.): Home-Grown Terrorism: Understanding and Addressing the Root Causes of Radicalisation among Groups with an Immigrant Heritage in Europe. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 60). Amsterdam: IOS Press, 143-160. DOI: https://doi. org/10.3233/978-1-60750-075-9-143 Speckhard, Anne; Shajkovci, Ardian (2019): The Jihad in Kenya: Understanding Al-Shabaab Recruitment and Terrorist Activity inside Kenya—in their own Words. African Security, 12(1), 3-61. DOI: https://doi.org/10.10 80/19392206.2019.1587142 Stankov, Lazar et al. (2019, Summer): Militant Extremist Mindset in Post-Conflict Regions of the Balkans. Journal for Deradicalization, 19, 185-218. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/221 Steinberg, Oliver (2016): AKTIONSKREIS Ehemaliger Extremisten Zu Sollbruchstellen rechtsradikaler Ideol- ogie. JEX, 4 (2016), n.p. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/157 St-Pierre, Yan (2015, Fall): Re-Enforcing Radicalisation with Bad PR? The Nigerian Army’s Handling of Boko Haram. Journal for Deradicalization, 4, 44-70. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/25 Streitwieser, Bernhard; Allen, Kristen; Duffy-Jaeger, Kathryn (2019, Spring): Higher Education in an Era of Violent Extremism: Exploring Tensions between National Security and Academic Freedom. Journal for Derad- icalization, 18, 74-107. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/187 Stuart, Hannah (2015): Critiquing Radical Islamist Claims to Theological Authenticity. In: Marco Lombardi et al. (Eds.): Countering Radicalisation and Violent Extremism among Youth to Prevent Terrorism. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 118). Amsterdam: IOS Press, 65-82. DOI: http://doi.org/10.3233/978-1-61499-470-1-65 Styszynski, Marcin (2015, October): Detainee Rehabilitation Programmes in Europe. Counter Terrorist Trends and Analyses, 7(9), 3-9. URL: https://www.rsis.edu.sg/wp-content/uploads/2015/10/CTTA-October-2015.pdf Sukabdi, Zora A. (2015, May): Terrorism in Indonesia: A Review on Rehabilitation and Deradicalization. Jour- nal of Terrorism Research, 6(2), 36-56. DOI: https://doi.org/10.15664/jtr.1154 Sukarieh, Mayssoun; Tannock, Stuart (2016, April): The Deradicalisation of Education: Terror, Youth and the Assault on Learning. Race & Class, 57(4), 22-38. DOI: https://doi.org/10.1177/0306396815621236 Sumpter, Cameron (2017, Summer): Countering Violent Extremism in Indonesia: Priorities, Practice and the Role of Civil Society. Journal for Deradicalization, 11, 112-147. URL: http://journals.sfu.ca/jd/index.php/jd/ article/view/103 Suyanto, Bagong; Sirry, Mun’im; Sugihartati, Rahma (2019, September): Pseudo-Radicalism and the De-Radi- calization of Educated Youth in Indonesia. Studies in Conflict & Terrorism. Advance Online Publication. DOI: https://doi.org/10.1080/1057610X.2019.1654726 Tammikko, Teemu (2018, Fall): The Political Challenges of Community-Level PVE Practices: The Danish Case of Copenhagen vs. Aarhus on Dialoguing with Extremist Milieus. Journal for Deradicalization, 16, 103-124. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/164 Taparli, Alper (2013): Community Coaching: Ein Veranstaltungsbericht. JEX, 2 (2013), 90-99. URL: http:// journals.sfu.ca/jed/index.php/jex/article/view/24 Taufiqurrohman, Muh; Arianti, V. (2014, April): The “Anti-Deradicalization” Movement of Indonesian Terror- ist Networks. Counter Terrorist Trends and Analyses, 6(3), 11-17. URL: https://www.rsis.edu.sg/wp-content/ uploads/2014/08/CTTA-April14.pdf

ISSN 2334-3745 121 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Thönnessen, Daniel (Interviewee); Wagner, Bernd (Interviewer) (2016): AKTIONSKREIS Ehemaliger Ex- tremisten Interview mit Daniel Thönnessen. JEX, 4 (2016), 115-120. URL: http://journals.sfu.ca/jed/index. php/jex/article/view/156 Tiflati, Hicham (2016, Spring): Western Islamic Schools as Institutions for Preventing Behavioral Radicaliza- tion: The Case of Quebec. Journal for Deradicalization, 6, 180-205. URL: http://journals.sfu.ca/jd/index.php/ jd/article/view/47 Tonn, Kristina (2013): Der Fall Tanja P. und das Urteil des Bundesverfassungsgerichts: Relevanz und Konse- quenzen für Rechtsprechung aus Deradikalisierungsarbeit. JEX, 1 (2013), 154-183. URL: http://journals.sfu.ca/ jed/index.php/jex/article/view/10 Tonn, Kristina (2014): Junge Rechtsradikale im Strafverfahren: Juristische Bewertung und Erarbeitung von Empfehlungen für die Gestaltung und Umsetzung von Auflagen und Weisungen aus juristischer Sicht.JEX , 1 (2014), 228-257. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/61 Upal, Afzal (2015, Spring): Alternative Narratives for Preventing the Radicalization of Muslim Youth. Journal for Deradicalization, 2, 138-162. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/14 van den Berg, Helma; van Hemert, Dianne A.; van Vliet, Anthony J. (2018, Summer): Creating a Knowledge Base for Interventions Countering (Violent) Extremism: Intervention Goals and Mechanisms for Different Ide- ologies. Journal for Deradicalization, 15, 43-75. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/149 van der Heide, Liesbeth; Huurman, Robert (2016, Fall): Suburban Bliss or Disillusionment – Why Do Terror- ists Quit? Journal for Deradicalization, 8, 1-24. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/64 van der Heide, Liesbeth; Schuurman, Bart (2018-2019, Winter): Reintegrating Terrorists in the Netherlands: Evaluating the Dutch Approach. Journal for Deradicalization, 17, 196-239. URL: http://journals.sfu.ca/jd/in- dex.php/jd/article/view/179 van Leyenhorst, Maarten; Andreas, Ada (2017, Fall): Dutch Suspects of Terrorist Activity: A Study of their Biographical Backgrounds Based on Primary Sources. Journal for Deradicalization, 12, 309-344. URL: http:// journals.sfu.ca/jd/index.php/jd/article/view/119 Veenkamp, Ivo; Zeiger, Sara (2015): Countering Violent Extremism: Program and Policy Approaches Relat- ing to Youth through Education, Families and Communities. In: Marco Lombardi et al. (Eds.): Countering Radicalisation and Violent Extremism among Youth to Prevent Terrorism. (NATO Science for Peace and Secu- rity Series – E: Human and Societal Dynamics, Vol. 118). Amsterdam: IOS Press, 151-163. DOI: https://doi. org/10.3233/978-1-61499-470-1-151 Vellenga, Sipco; De Groot, Kees (2019, June): Securitization, Islamic Chaplaincy, and the Issue of (De) radicalization of Muslim Detainees in Dutch Prisons. Social Compass, 66(2), 224-237. DOI: https://doi. org/10.1177/0037768619833313 Vidino, Lorenzo (2011): Counter-Radicalization in the United States. In: Rik Coolsaet (Ed.): Jihadi Terrorism and the Radicalisation Challenge: European and American Experiences. (2nd ed.). Farnham: Ashgate, 247-258. Wagner, Bernd (2013): Ein Beitrag zur Geschichte und zu Formatierungen von Ausstiegsinitiativen in Sachen Rechtsradikalismus in Deutschland (1990 – 2013). JEX, 2 (2013), 4-44. URL: http://journals.sfu.ca/jed/index. php/jex/article/view/18 Wagner, Bernd (2013): Kriminalistische Grundlagen der Deradikalisierungsarbeit: Ein einleitender Beitrag zur ersten Ausgabe des Journal EXIT-Deutschland. JEX, 1 (2013), 1-16. URL: http://journals.sfu.ca/jed/index. php/jex/article/view/15

ISSN 2334-3745 122 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Wagner, Bernd (2013): Zur Zusammenarbeit privatrechtlicher Initiativen und staatlichen Organisationen in Ausstiegsprozessen aus politisch radikalen Bewegungen. JEX, 3 (2013), 4-23. URL: http://journals.sfu.ca/jed/ index.php/jex/article/view/37 Wagner, Bernd (2015): Gesprächsrunde “ZusammenHALTen – Gegen Gewalt, für Dialog” am 21. Januar 2015 in Schloss Bellevue – Impulsreferat Rechtsextremismus. [Speech Manuscript]. JEX, 1 (2015), 178-182. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/119 Wagner, Bernd (2016): Extremismus und Deradikalisierung – Innere Sicherheit und Innerer Friede: Eine Pro- grammatik des Kompetenzverbundes Extremismus und Deradikalisierung. JEX, 4 (2016), 22-31. URL: http:// journals.sfu.ca/jed/index.php/jex/article/view/150 Wagner, Bernd (2016): Rechtsextremismus und Rechtsradikalismus in Deutschland: Überblick über Ges- chichte und aktuelle Tendenzen. JEX, 4 (2016), 6-21. URL: http://journals.sfu.ca/jed/index.php/jex/article/ view/149 Wagner, Bernd (2017): Der Weg zurück – Deradikalisierung in Deutschland: Der Sektor der ideolo- gisch-politischen Radikalität und Deradikalisierung als gesellschaftliches Erfordernis der Demokratie. JEX, 5 (2017), 4-31. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/4 Wagner, Bernd (2018): Rechtsradikalismus und Ausstieg – Erfahrungen und Überlegungen. JEX, 7 (2018), 13- 30. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/13 Wagner, Bernd (2018): Überlegungen zur Strafrechtsanwendung und rechtsextrem intendierten kriminellen Aktivität. JEX, 7 (2018), 2-12. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/186 Wagner, Bernd; Krause, Ulrike (2013): Zum Ausstieg von Frauen (mit Kindern). JEX, 2 (2013), 220-229. Wagner, Bernd; Wichmann, Fabian; Borstel, Dierk (2013): Familienberatung und Deradikalisierung: Auss- tiegsorientierung im familiären und sozialräumlichen Beratungskontext. JEX, 1 (2013), 108-153. URL: http:// journals.sfu.ca/jed/index.php/jex/article/view/11 Wali, Farhaan (2017, Summer): Islamist Indoctrination: Exploring the Techniques used by Hizb Ut-Tahrir to Radicalize Young British Muslims. Journal for Deradicalization, 11, 30-58. URL: http://journals.sfu.ca/jd/ index.php/jd/article/view/98 Walsh, Maria; Gansewig, Antje (2019-2020, Winter): A Former Right-Wing Extremist in School-Based Pre- vention Work: Research Findings from Germany. Journal for Deradicalization, 21, 1-42. URL: http://journals. sfu.ca/jd/index.php/jd/article/view/275 Warrington, Anna (2017, Summer): Countering Violent Extremism via De-Securitisation on Twitter. Journal for Deradicalization, 11, 258-280. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/106 Warrington, Anna (2018, Spring): “Sometimes You Just Have to Try Something” – A Critical Analysis of - ish State-Led Initiatives Countering Online Radicalisation. Journal for Deradicalization, 14, 111-152. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/137 Webber, David (2019): A Significance Quest Framework of Radicalization and Deradicalization. In: Martine Herzog-Evans; Massil Benbouriche (Eds.): Evidence-Based Work with Violent Extremists: International Impli- cations of French Terrorist Attacks and Responses. Lanham: Lexington Books, 91-106. Webber, David et al. (2018, June): Deradicalizing Detained Terrorists. Political Psychology, 39(3), 539-556. DOI: https://doi.org/10.1111/pops.12428 URL: https://www.researchgate.net/publication/314359021_Derad- icalizing_Detained_Terrorists Weeks, Douglas (2018): Doing Derad: An Analysis of the U.K. System. Studies in Conflict & Terrorism, 41(7), 523-540. DOI: https://doi.org/10.1080/1057610X.2017.1311107

ISSN 2334-3745 123 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Weeks, Douglas (2018): Doing Deradicalisation: A Profile of the Mentoring System and Providers in the Unit- ed Kingdom. In: Orla Lynch; Javier Argomaniz (Eds.): Victims and Perpetrators of Terrorism: Exploring Identi- ties, Roles and Narratives. (Contemporary Terrorism Studies). Abingdon: Routledge, 165-180. Weeks, Douglas (2019): Barking Mosque and Quintessential Insight: Overcoming the Problematic Govern- ment/Community Counterterrorism Partnership in the UK. Studies in Conflict & Terrorism, 42(8), 735-754. DOI: https://doi.org/10.1080/1057610X.2018.1425087 Weißgerber, Christian Ernst (2014): Das Kaleidoskop der Radikalisierung: Ein Plädoyer für die Verabschie- dung des Extremismusbegriffs. JEX, 1 (2014), 187-227. URL: http://journals.sfu.ca/jed/index.php/jex/article/ view/60 Weißgerber, Christian Ernst (Interviewee); Hutzel, Tine (Interviewer) (2014): „Die Freiheit, die ich meinte“: Ein Interview mit Christian Ernst Weißgerber, Aussteiger aus der rechten Szene, geführt am 18.12.2013. JEX, 1 (2014), 294-306. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/63 Whittaker, Joe; Elsayed, Lilah (2019, Fall): Linkages as a Lens: An Exploration of Strategic Communications in P/CVE. Journal for Deradicalization, 20, 1-46. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/243 Wichmann, Fabian (2017): 4 Ways to Turn the Neo-Nazi Agenda on its Head: Sometimes Humor and Accep- tance are More Powerful than Confrontation. JEX, 5 (2017), 93-98. URL: http://journals.sfu.ca/jed/index.php/ jex/article/view/93 Wichmann, Fabian (2017): Von T-Shirts und unfreiwillig spendablen Neonazis: Erfolgreiche Gegenstrategien in der Auseinandersetzung mit freiheitsfeindlichen Ideologien. JEX, 5 (2017), 79-90. URL: http://journals.sfu. ca/jed/index.php/jex/article/view/81 Wichmann, Fabian (2018): Successfully Countering Hate and Far-Right Propaganda: The Story of EXIT-Ger- many. JEX, 7 (2018), 64-67. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/64 Wichmann, Fabian; Benneckenstein, Felix (2018): Einmal Nazi, immer Nazi? Arbeit und Erfahrungen von EX- IT-Deutschland und der Aussteigerhilfe Bayern in der Ausstiegsbegleitung. JEX, 7 (2018), 57-63. URL: http:// journals.sfu.ca/jed/index.php/jex/article/view/57 Williams, Michael J.; Kleinman, Steven M. (2014): A Utilization-Focused Guide for Conducting Terrorism Risk Reduction Program Evaluations. Behavioral Sciences of Terrorism and Political Aggression, 6(2), 102-146. DOI: https://doi.org/10.1080/19434472.2013.860183 Williams, Michael J.; Lindsey, Samuel C. (2014): A Social Psychological Critique of the Saudi Terrorism Risk Reduction Initiative. Psychology, Crime & Law, 20(2), 135-151. DOI: https://doi.org/10.1080/106831 6X.2012.749474 Williams, Timothy (2019, Summer): Ideological and Behavioural Radicalisation into Terrorism – An Alterna- tive Sequencing. Journal for Deradicalization, 19, 85-121. URL: http://journals.sfu.ca/jd/index.php/jd/article/ view/215 Wilner, Alex; Rigato, Brandon, on behalf of the “60 Days of PVE” Group (2017, Fall): The 60 Days of PVE Campaign: Lessons on Organizing an Online, Peer-to-Peer, Counter-Radicalization Program. Journal for De- radicalization, 12, 227-268. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/117 Windisch, Steven et al. (2016-2017, Winter): Disengagement from Ideologically-Based and Violent Organiza- tions: A Systematic Review of the Literature. Journal for Deradicalization, 9, 1-38. URL: http://journals.sfu.ca/ jd/index.php/jd/article/view/72 Wuchte, Thomas; Knani, Mehdi (2013): Countering Violent Extremism and Radicalization that Lead to Ter- rorism: The OSCE’s Unique Regional Blueprint.JEX , 2 (2013), 76-86. URL: http://journals.sfu.ca/jed/index. php/jex/article/view/22

ISSN 2334-3745 124 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Yaqoob, Munazza (2019): Contribution of the Critical Thinking Forum in the Deradicalization of Pakistani Youth: A Case Study. In: Tahir Abbas; Sadek Hamid (Eds.): Political Muslims: Understanding Youth Resistance in a Global Context. (Contemporary Issues in the Middle East). New York: Syracuse University Press, 213-230. Zahid, Farhan (2017, June): Pakistan’s CVE Programme: An Overview of Achievements and Challenges. Count- er Terrorist Trends and Analyses, 9(6), 11-16. URL: https://www.rsis.edu.sg/wp-content/uploads/2017/06/ CTTA_June_2017.pdf Zan, Fatma (2016): Der IS und seine Feindbilder des „Westen“ in der IS-Propagandazeitschrift Dābiq.JEX , 4 (2016), 77-82. URL: http://journals.sfu.ca/jed/index.php/jex/article/view/153 Zenn, Jacob; Pieri, Zacharias (2017, Summer): How much Takfir is too much Takfir? The Evolution of Boko Haram’s Factionalization. Journal for Deradicalization, 11, 281-308. URL: http://journals.sfu.ca/jd/index.php/ jd/article/view/107 Zhou, Zunyou (2019): Chinese Strategy for De-Radicalization. Terrorism and Political Violence, 31(6), 1187- 1209. DOI: https://doi.org/10.1080/09546553.2017.1330199 Zick, Andreas; Böckler, Nils (2015): Radikalisierung als Inszenierung: Vorschlag für eine Sicht auf den Prozess der extremistischen Radikalisierung und die Prävention. forum kriminalprävention, 3/2015, 6-16. URL: https:// www.forum-kriminalpraevention.de/files/1Forum-kriminalpraevention-webseite/pdf/2015-03/2015-03_ra- dikalisierung_als_inzenierung.pdf Zuhur, Sherifa (2009): Decreasing Violence in Saudi Arabia and Beyond. In: Thomas M. Pick; Anne Speckhard; Beatrice Jacuch (Eds.): Home-Grown Terrorism: Understanding and Addressing the Root Causes of Radicalisa- tion among Groups with an Immigrant Heritage in Europe. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 60). Amsterdam: IOS Press, 74-98. DOI: https://doi.org/10.3233/978-1- 60750-075-9-74 Zuschke, Amelie (2015, Summer): Extremismus im Klassenzimmer – Theoretische Chancen und Möglichkeit- en des Politikunterrichtes. Journal for Deradicalization, 3, 135-148. URL: http://journals.sfu.ca/jd/index.php/ jd/article/view/19

Grey Literature Ali, Rashad (2015, October): De-Radicalization and Integration: The United Kingdom’s Channel Programme. (GW Program on Extremism Paper; Countering Violent Extremism Series). URL: https://extremism.gwu.edu/ sites/g/files/zaxdzs2191/f/downloads/Rashad%20Ali.pdf Al Raffie, Dina (2015, October): The Identity-Extremism Nexus: Countering Islamist Extremism in the West. (GW Program on Extremism Paper; Countering Violent Extremism Series). URL: https://extremism.gwu.edu/ sites/g/files/zaxdzs2191/f/downloads/Al%20Raffie.pdf Ashour, Omar (2008, November): Islamist De-Radicalization in Algeria: Successes and Failures. (MEI Policy Brief). URL: https://www.mei.edu/publications/islamist-de-radicalization-algeria-successes-and-failures Baaken, Till et al. (2018): Herausforderung Deradikalisierung: Einsichten aus Wissenschaft und Praxis. (PRIF Report 9/2018; HSFK-Reportreihe „Gesellschaft Extrem”). URL:https://www.hsfk.de/publikationen/publika - tionssuche/publikation/herausforderung-deradikalisierung-einsichten-aus-wissenschaft-und-praxis Berger, J. M. (2016, May): Making CVE Work: A Focused Approach Based on Process Disruption. (ICCT Re- search Paper). DOI: https://doi.org/10.19165/2016.1.05 Bergin, Anthony et al. (2009, March): Countering Internet Radicalisation in Southeast Asia. (RSIS–ASPI Joint Report; ASPI Special Report, Issue 22). URL: https://www.aspi.org.au/report/special-report-issue-22-counter-

ISSN 2334-3745 125 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

ing-internet-radicalisation-southeast-asia Bigo, Didier et al. (2014, April): Preventing and Countering Youth Radicalisation in the EU. (European Par- liament Study PE 509.977). URL: http://www.europarl.europa.eu/thinktank/en/document.html?refer- ence=IPOL-LIBE_ET(2014)509977 Bilazarian, Talene (2016, October): Countering Violent Extremism: Lessons on Early Intervention from the Unit- ed Kingdom’s Channel Program. (GW Program on Extremism Occasional Paper). URL: https://extremism.gwu. edu/sites/g/files/zaxdzs2191/f/downloads/Channel%20CVE%20UK.pdf Braizat, Fares et al. (2017, November): Determining Youth Radicalization in Jordan. (ICSVE Research Report). URL: https://www.icsve.org/determining-youth-radicalization-in-jordan Butt, Riazat; Tuck, Henry (2014): European Counter-Radicalisation and De-Radicalisation: A Comparative Eval- uation of Approaches in the Netherlands, Sweden, Denmark and Germany. (ISD Report). URL: https://www. eukn.eu/fileadmin/Files/News/De-radicalisation_final.pdf Canadian Security Intelligence Service (CSIS) (2015, December): Personality Traits and Terrorism. (TSAS Working Paper Series, No. 15-05). URL: https://www.tsas.ca/publications/personality-traits-and-terrorism Centre for Research and Evidence on Security Threats (CREST) (2019):Deradicalisation Programmes: Intro- ductory Guide. URL: https://crestresearch.ac.uk/resources/deradicalisation-programmes-introductory-guide Cilluffo, Frank J.; Cardash, Sharon L.; Khor, Laura O. (2014, June): Detainee Release and Global Public Safety: Terrorist Disengagement and Deradicalization Programs -The Way Ahead. (HSPI Issue Brief Series, No. 22). URL: http://cchs.auburn.edu/_files/detainee-release-and-global-public-saftey.pdf Colliver, Chloe et al. (2019): Women, Girls and Islamist Extremism: A Toolkit for Intervention Practitioners. (ISD Toolkit). URL: https://www.isdglobal.org/isd-publications/women-girls-and-islamist-extremism Cominetti, Valentina (2018, December): The Italian Approach to De-Radicalization. (ICT Articles). URL: http:// www.ict.org.il/Article/2302/The_Italian_approach_to_de-radicalization Davey, Jacob; Birdwell, Jonathan; Skellett, (2018, February): Counter Conversations: A Model for Di- rect Engagement with Individuals Showing Signs of Radicalisation Online. (ISD Report). URL: https://www.is- dglobal.org/isd-publications/counter-conversations-a-model-for-direct-engagement-with-individuals-show- ing-signs-of-radicalisation-online Davey, Jacob; Tuck, Henry; Amarasingam, Amarnath (2019): An Imprecise Science: Assessing Interventions for the Prevention, Disengagement and De-Radicalisation of Left and Right-Wing Extremists. (ISD Report). URL: https://www.isdglobal.org/isd-publications/an-imprecise-science-assessing-interventions-for-the-preven- tion-disengagement-and-de-radicalisation-of-left-and-right-wing-extremists Dean, Christopher (2016, September): Addressing Violent Extremism in Prisons and Probation: Principles for Effective Programs and Interventions. (Global Center on Cooperative Security Policy Brief). URL: https://www. globalcenter.org/publications/addressing-violent-extremism-in-prisons-and-probation Fighel, Jonathan (2009, December): The Saudi Double-Game: The Internet “Counter-Radicalization” Campaign in Saudi Arabia. (ICT Articles). URL: http://www.ict.org.il/Article.aspx?ID=733 Fink, Naureen Chowdhury; with Ellie B. Hearne (2008, October): Beyond Terrorism: Deradicalization and Dis- engagement from Violent Extremism. (IPI Paper). URL: https://www.ipinst.org/2008/10/beyond-terrorism-de- radicalization-and-disengagement-from-violent-extremism Ford, Katie (2016, March): Policies and Responsibilities for Governing Violent Extremism at Ontario Universities. (TSAS Working Paper Series, No. 16-01). URL: https://www.tsas.ca/publications/policies-and-responsibili- ties-for-governing-violent-extremism-at-ontario-universities

ISSN 2334-3745 126 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Fraser-Rahim, Muhammad (2018): In and out of Extremism USA: A Case Study on the Deradicalisation Process of the Youngest Individual to be Indicted on Terror Charges in the United States. (Quilliam Report). URL: https:// www.quilliaminternational.com/shop/e-publications/in-and-out-of-extremism-usa Fraser-Rahim, Muhammad; Taylor, Adrian (2018, Spring): Transforming the Hate that Hate Produced: An Anal- ysis of the History and Counter-Radicalization Efforts of the Community of Imam WD Mohammed. (Quilliam Policy Report). URL: https://www.quilliaminternational.com/shop/e-publications/transforming-the-hate- that-hate-produced-an-analysis-of-the-history-and-counter-radicalization-efforts-of-the-community-of- imam-wd-mohammed Frenett, Ross; Dow, Moli (2015, September): One to One Online Interventions: A Pilot CVE Methodology. (Re- port; ISD / Curtin University). URL: https://www.isdglobal.org/isd-publications/one-to-one-online-interven- tions-a-pilot-cve-methodology Gaudino, Ugo (2018, December): Radicalization and De-Radicalization of Italian Muslims. Mediterranean Inse- curity. URL: http://www.mediterraneaninsecurity.it/2018/12/31/radicalization-and-de-radicalization-of-ital- ian-muslims-ugo-gaudino Hadjimatheou, Katerina (2017): Ethical Considerations in Counter-Radicalisation. (Pericles Result Report). URL: http://project-pericles.eu/dissemination/ethical-considerations-counter-radicalisation Hill, Jonathan N. C. (2010, May): Sufism in Northern Nigeria: Force for Counter-Radicalization? (SSI Mono- graphs). URL: https://ssi.armywarcollege.edu/sufism-in-northern-nigeria-a-force-for-counter-radicalization Hoeft, Gabriel (2015, Spring):“Soft” Approaches to Counter-Terrorism: An Exploration of the Benefits of Derad- icalization Programs. (ICT Paper). URL: https://www.ict.org.il/Article/1620/Soft-Approaches-to-Counter-Ter- rorism Hussain, Ghaffar (2015, October): Countering Extremism: Learning from the United Kingdom Model. (GW Pro- gram on Extremism Paper; Countering Violent Extremism Series). URL: https://extremism.gwu.edu/sites/g/ files/zaxdzs2191/f/downloads/Hussain.pdf Idris, Iffat (2019, October): Preventing/Countering Violent Extremism Programming on Men, Women, Boys and Girls. (GSDRC; K4D Helpdesk Report 671). URL: https://gsdrc.org/publications/preventing-countering-vio- lent-extremism-programming-on-men-women-boys-and-girls Ingram, Haroro J. (2016, November): A “Linkage-Based” Approach to Combating Militant Islamist Propaganda: A Two-Tiered Framework for Practitioners. (ICCT Policy Brief). DOI: https://doi.org/10.19165/2016.2.06 Institute for Policy Analysis of Conflict (IPAC) (2016, December):Update on Indonesian Pro-ISIS Prisoners and Deradicalisation Efforts.(IPAC Report No. 34). URL: http://www.understandingconflict.org/en/conflict/ read/57/Update-on-Indonesian-Pro-ISIS-Prisoners-and-Deradicalisation-Efforts International Centre for Political Violence and Terrorism Research (ICPVTR) (2010, July): Combating Ter- rorism in Yemen through the Committee for Religious Dialogue. (Event Report). URL: https://www.rsis.edu.sg/ rsis-publication/icpvtr/report-combating-terrorism-in-yemen-through-the-committee-for-religious-dialogue International Crisis Group (ICG) (2007, November): “Deradicalisation” and Indonesian Prisons. (Asia Re- port N°142). URL: https://www.crisisgroup.org/asia/south-east-asia/indonesia/deradicalisation-and-indone- sian-prisons Jensen, Michael; James, Patrick; Yates, Elizabeth (2019): Profiles of Individual Radicalization in the United States—Desistance, Disengagement, and Deradicalization (PIRUS-D3). (START Research Brief). URL: https:// www.start.umd.edu/publication/profiles-individual-radicalization-united-states-desistance-disengage- ment-and

ISSN 2334-3745 127 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Kamolnick, Paul (2014, June): Countering Radicalization and Recruitment to Al-Qaeda: Fighting the War of Deeds. (SSI; The Letort Papers). URL:https://ssi.armywarcollege.edu/countering-radicalization-and-recruit - ment-to-al-qaeda-fighting-the-war-of-deeds Khalil, James (2019, January): Deradicalisation and Disengagement in Somalia: Evidence from a Rehabilitation Programme for Former Members of Al-Shabaab. (RUSI Report 4-18). URL: https://rusi.org/publica- tion/whitehall-reports/deradicalisation-and-disengagement-somalia-evidence-rehabilitation Khalil, James; Zeuthen, Martine (2016, June): Countering Violent Extremism and Risk Reduction: A Guide to Programme Design and Evaluation. (RUSI Whitehall Report 2-16). URL: https://rusi.org/publication/white- hall-reports/countering-violent-extremism-and-risk-reduction-guide-programme-design Khan, Selina Adam (2015, September): Deradicalization Programming in Pakistan. (USIP Peace Brief 193). URL: https://www.usip.org/publications/2015/09/deradicalization-programming-pakistan Köhler, Daniel (2015, July): De-Radicalization Programs and Counter-Terrorism: A Promising Agenda? (ISN Articles). URL: https://css.ethz.ch/en/services/digital-library/publications/publication.html/192746 Kudlacek, Dominic et al. (2017): Gap Analysis on Counter-Radicalisation Measures. (Pericles Result Report). URL: http://project-pericles.eu/wp-content/uploads/2017/10/Pericles-D1.2-Gap-Analysis-Report.pdf Kudlacek, Dominic et al. (2017): Prevention of Radicalisation in Selected European Countries: A Comprehensive Report of the State of the Art in Counter-Radicalisation. (Pericles Result Report). URL: http://project-pericles. eu/dissemination/prevention-of-radicalisation Levy, Ido (2018, April): Deradicalization Programs in Australia and the Foreign Fighter Phenomenon. (ICT Pa- per). URL: http://www.ict.org.il/Article/2178/Deradicalization_Programs_in%20Australia_%20and_the_For- eign_Fighter_Phenomenon Manning, ; La Bau, Courtney (2015, August): “In and Out of Extremism”: How Quilliam Helped 10 Former Far-Right and Islamists Change. (Quilliam Report). URL: https://www.quilliaminternational.com/shop/e-pub- lications/in-and-out-of-extremism Marret, Jean-Luc et al. (2017, June): Innovative Methods and Procedures to Assess Counter-Violent-Radicalisa- tion Techniques in Europe. (IMPACT Europe Final Project Synthesis Report). URL: http://impacteurope.eu/ wp-content/uploads/2017/11/D6.2-Final-Synthesis-report.pdf Mattei, Cristina (2019, January): The CVE Cycle: An Individual Trajectory.(Hedayah Report). URL: https:// www.hedayahcenter.org/resources/reports_and_publications/the-cve-cycle-an-individual-trajectory Mattei, Cristina; Gyte, Joseph (2019, May): Providing Support to Children and Youth: Vulnerable to or Affected by Radicalization Leading to Violent Extremism (RLVE). (Hedayah Report). URL: https://www.hedayahcenter. org/resources/reports_and_publications/providing-support-to-children-and-youth-vulnerable-to-or-affect- ed-by-rlve McDonnell, Andrew; Patton, James; Salloum, Yara Zgheib (2018, October): Engaging Salafi Religious Actors in Morocco: The Role of Inclusion in Countering Violent Extremism. (ICRD Report). URL: https://icrd.org/engag- ing salafi-religious-actors-in-morocco-the-role-of-inclusion-in-cve Meyer, Patrik (2016, June): China’s De-Extremization of Uyghurs in Xinjiang. (New America International Secu- rity Policy Paper). URL: https://www.newamerica.org/international-security/policy-papers/china-de-extrem- ization-uyghurs-xinjiang Middle East Institute (MEI); Fondation pour la Recherche Stratégique (FRS) (Eds.) (2015, June): Understand- ing Deradicalization: Pathways to Enhance Transatlantic Common Perceptions and Practices. (Essay Collec- tion) URL: https://www.mei.edu/publications/understanding-deradicalization-pathways-enhance-transatlan- tic-common-perceptions-and

ISSN 2334-3745 128 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Ministry of Refugee, Immigration and Integration Affairs [Denmark] (2010, October): The Challenge of Ex- tremism: Examples of Deradicalisation and Disengagement Programmes in the EU. (Report). URL: https://ec.eu- ropa.eu/migrant-integration/index.cfm?action=media.download&uuid=2A283FA8-A7BE-C748-F9C58D- 204801D86A Miró Llinares, Fernando; Gómez Bellvís, Ana Belén; Fernández Castejón, Elena Beatriz (2018): International and European Union Legal Framework of Counter-Radicalisation Report. (Pericles Result Report). URL: http:// project-pericles.eu/dissemination/international-and-european-union-legal-framework-of-counter-radicalisa- tion-report Mirza, Rabiyah (2018): Canadian Women in ISIS: Deradicalization and Reintegration for Returnees. (University of Ottawa Research Paper). URL: https://ruor.uottawa.ca/handle/10393/38238 Neumann, Peter R. (2010): Prisons and Terrorism: Radicalisation and De-Radicalisation in 15 Countries. (ICSR Policy Report). URL: https://www.clingendael.org/publication/prisons-and-terrorism-radicalisa- tion-and-de-radicalisation-15-countries Neumann, Peter R. (2012, December): Countering Online Radicalization in America. (BPC National Security Program Report). URL: https://bipartisanpolicy.org/report/countering-online-radicalization-america-0 Neumann, Peter R. (2017, September): Countering Violent Extremism and Radicalisation that Lead to Terror- ism: Ideas, Recommendations, and Good Practices from the OSCE Region. (OSCE Report). URL: https://www. osce.org/chairmanship/346841 Neumann, Peter et al. (2018): Die Rolle des Internets und sozialer Medien für Radikalisierung und Deradi- kalisierung. (PRIF Report 10/2018; HSFK-Reportreihe „Gesellschaft Extrem”). URL: https://www.hsfk.de/ en/publications/publication-search/publication/die-rolle-des-internets-und-sozialer-medien-fuer-radikalis- ierung-und-deradikalisierung Nguyen, Alixia (2018, August): Radicalization and Deradicalization in France. (ICT Study). URL: http://www. ict.org.il/Article/2423/Radicalization_Deradicalization_France Parent, Richard B.; Ellis, James O., III (2011, September): Countering Radicalization of Diaspora Communities in Canada. (Metropolis British Columbia, Centre of Excellence for Research on Immigration and Diversity Working Paper Series, No. 11-12). URL: https://www.publicsafety.gc.ca/lbrr/archives/cnmcs-plcng/cn35941- eng.pdf Praxl-Tabuchi, Franziska (2019, April): Gendered Pathways to Radicalization and Desistance from Violent Ex- tremism: Lessons from Early-Intervention Programs in the United Kingdom. (Academic Paper; Global Center on Cooperative Security / UN Women). URL: https://www.globalcenter.org/publications/gendered-path- ways-to-radicalization-and-desistance-from-violent-extremism Quivooij, Romain (2016, December): The French Counter-Radicalisation Strategy. (RSIS Working Paper series, No. 301). URL: https://www.rsis.edu.sg/rsis-publication/cens/wp301 Radicalisation Awareness Network (RAN) (2016, March): Outline: Deradicalisation Interventions for Violent Extremism. (RAN EXIT Ex Post Paper). URL: https://ec.europa.eu/home-affairs/sites/homeaffairs/files/what- we-do/networks/radicalisation_awareness_network/about-ran/ran-exit/docs/ran_exit-ex_post_paper_lon- don_15-16032016_en.pdf Raees Khan, Raafia; Peracha, Feriha (2017, November): Deradicalizing, Rehabilitating, and Reintegrating Vi- olent Extremists. (USIP Peace Brief No. 238). URL: https://www.usip.org/publications/2017/11/deradicaliz- ing-rehabilitating-and-reintegrating-violent-extremists Routray, Bibhu Prasad (2019, July): Islamic State Returnees: India’s Counter-Radicalization vs Deradicalisation Approach. (ISPSW Strategy Series: Focus on Defense and International Security, Issue No. 632). URL: https:// www.ispsw.com/wp-content/uploads/2019/07/632_Routray.pdf ISSN 2334-3745 129 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Saifudeen, Omer Ali (2014, November): The Cyber Extremism Orbital Pathways Model. (RSIS Working Pa- per No. 283). URL: https://www.rsis.edu.sg/rsis-publication/rsis/wp283-the-cyber-extremism-orbital-path- ways-model Schmid, Alex P. (2013, March): Radicalisation, De-Radicalisation, Counter-Radicalisation: A Conceptual Dis- cussion and Literature Review. (ICCT Research Paper). DOI: https://doi.org/10.19165/2013.1.02 Schmid, Alex P. (2018, August): Reflecting on: Radicalisation, De-Radicalisation and Counter-Radicalisation. (ICCT Publication). URL: https://icct.nl/publication/reflecting-on-radicalisation-de-radicalisation-and-count- er-radicalisation Schmidt, Rachel (2018, August): Duped: Why Gender Stereotypes are Leading to Inadequate Deradicalization and Disengagement Strategies. (TSAS Working Paper Series, No. 18-07). URL: https://www.tsas.ca/publica- tions/duped-why-gender-stereotypes-are-leading-to-inadequate-deradicalization-and-disengagement-strate- gies-2 Sieckelinck, Stijn; de Winter, Micha (Eds.) (2015, October): Formers and Families: Transitional Journeys in and out of Extremisms in the United Kingdom, Denmark and The Netherlands. (NCTV Report). The Hague: National Coordinator Security and Counterterrorism (NCTV). URL: https://www.researchgate.net/publica- tion/283666698_Formers_and_FamiliesTransitional_journeys_in_and_out_of_extremisms_in_the_United_ Kingdom_Denmark_and_the_Netherlands Speckhard, Anne; Shajkovci, Ardian (2017, September): Winning against al-Qaeda and ISIS: The Case for Combining Deradicalization with Disengagement Approaches in Prison and Community Programs Addressing Former and Current Members of Militant Jihadi Groups. (ICSVE Research Report). URL: http://www.icsve. org/research-reports/winning-against-al-qaeda-and-isis-the-case-for-combining-deradicalization-with-dis- engagement-approaches-in-prison-and-community-programs-addressing-former-and-current-members-of- militant-jihadi-group Speckhard, Anne; Shajkovci, Ardian; Bodo, Lorand (2018, March): Fighting ISIS on Facebook—Breaking the ISIS Brand Counter-Narratives Project. (ICSVE Research Reports). URL: http://www.icsve.org/fighting-isis-on- facebook-breaking-the-isis-brand-counter-narratives-project Speckhard, Anne et al. (2018, February): Bringing Down the Digital Caliphate: A Breaking the ISIS Brand Count- er-Narratives Intervention with Albanian Speaking Facebook Accounts. (ICSVE Research Reports). URL: http:// www.icsve.org/bringing-down-the-digital-caliphate-a-breaking-the-isis-brand-counter-narratives-interven- tion-with-albanian-speaking-facebook-accounts Stevens, Tim; Neumann, Peter R. (2009, March): Countering Online Radicalisation: A Strategy for Action. (ICSR Policy Report). URL: https://icsr.info/2010/03/09/the-challenge-of-online-radicalisation-a-strategy-for-action Tapley, Marina; Clubb, Gordon (2019, April): The Role of Formers in Countering Violent Extremism. (ICCT Policy Brief). URL: https://icct.nl/publication/the-role-of-formers-in-countering-violent-extremism Uhlmann, Milena (2017): Evaluation of the Advice Centre on Radicalisation: Final Report. (Federal Office for Migration and Refugees [BAMF] Research Centre Research Report 31). URL: https://www.bamf.de/Shared- Docs/Anlagen/EN/Forschung/Forschungsberichte/fb31-evaluation-beratungsstelle-radikalisierung.pdf van Eerten, Jan-Jaap et al. (2017, September): Developing a Social Media Response to Radicalization: The Role of Counter-Narratives in Prevention of Radicalization and De-Radicalization. (WODC Report). URL: https:// www.wodc.nl/onderzoeksdatabase/2607-effectiviteit-van-counter-narratives.aspx Vidino, Lorenzo (2010, November): Countering Radicalization in America: Lessons from Europe. (USIP Special Report). URL: https://www.usip.org/publications/2010/11/countering-radicalization-america Whittaker, Joe; Elsayed, Lilah (2019, November): Revisiting the Theatre of Terror in CVE. (ICCT Perspectives). URL: https://icct.nl/publication/revisiting-the-theatre-of-terror-in-cve ISSN 2334-3745 130 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Young, Holly et al. (2016, July): Evidence-Based Policy Advice. (TerRa Final Report). URL: https://www.quillia- minternational.com/shop/e-publications/terra-evidence-based-policy-advice Zeiger, Sara (2014, December): Disengagement and De-Radicalization. (Hedayah CVE Research Brief 1). URL: https://www.hedayahcenter.org/resources/reports_and_publications/cve-research-brief-1-disengage- ment-de-radicalization

Note Whenever retrievable, URLs for freely available versions of subscription-based publications have been provid- ed. Thanks to the Open Access movement, self-archiving of publications in institutional repositories, on pro- fessional networking sites, or author homepages for free public use (so-called Green Open Access) has become more common. Please note, that the content of Green Open Access documents is not necessarily identical to the officially published versions (e.g., in case of preprints); it might therefore not have passed through all ed- itorial stages publishers employ to ensure quality control (peer review, copy and layout editing etc.). In some cases, articles may only be cited after obtaining permission by the author(s).

About the Compiler: Judith Tinnes, Ph.D., is a Professional Information Specialist. Since 2011, she works for the Leibniz Institute for Psychology Information (ZPID). Additionally, she serves as Information Resources Editor to ‘Perspectives on Terrorism’. In her editorial role, she regularly compiles bibliographies and other resources for Ter- rorism Research (for an inventory visit https://archive.org/details/terrorism-research-bibliographies). She wrote her doctoral thesis on Internet usage of Islamist terrorists and insurgents (focus: media-oriented hostage takings). E-mail: [email protected]

ISSN 2334-3745 131 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Bibliography: Terrorism by Country – Iran Compiled and selected by Judith Tinnes

[Bibliographic Series of Perspectives on Terrorism – BSPT-JT-2020-2] Abstract This bibliography contains journal articles, book chapters, books, edited volumes, theses, grey literature, bibli- ographies and other resources on terrorism affecting Iran. It covers both terrorist activity within the country’s borders (regardless of the perpetrators’ nationality) and terrorist activity by Iranian nationals abroad, and also includes relevant publications dealing with the broader political and religious context of Iran. It focuses on recent publications (up to January 2020) and should not be considered as exhaustive. The literature has been retrieved by manually browsing more than 200 core and periphery sources in the field of Terrorism Studies. Additionally, full-text and reference retrieval systems have been employed to broaden the search.

Keywords: bibliography, resources, literature, terrorism, Iran, Shia militias, Hezbollah, proxy war NB: All websites were last visited on 11.02.2020. – See also Note for the Reader at the end of this literature list.

Bibliographies and other Resources Chatham House (2006-): Iran. Retrieved from https://www.chathamhouse.org/research/regions/middle-east- and-north-africa/iran Hart, Jo-Anne (1980): A Bibliographical Survey of the Iranian Revolution. Iranian Studies, 13(1-4), 369-390. URL: https://www.jstor.org/stable/4310347 Hart, Jo-Anne (1983, Winter-Spring): Bibliography: A Bibliographical Survey of the Iranian Revolution, II. Iranian Studies, 16(1-2), 99-121. URL: https://www.jstor.org/stable/4310410 Hussain, Asaf (1983): Islamic Movements in Egypt, Pakistan and Iran: An Annotated Bibliography. London: Mansell. MidEastWeb (2004): Bibliography – Iran. URL: http://www.mideastweb.org/iranbib.htm RAND Corporation (1979-): Iran. URL: https://www.rand.org/topics/iran.html Richard, Yann (2019): Bibliography. In: Iran: A Social and Political History since the Qajars. Cambridge: Cam- bridge University Press, 326-342. DOI: https://doi.org/10.1017/9781108569071

Books and Edited Volumes Alexander, Yonah; Hoenig, Milton M. (2008): The New Iranian Leadership: Ahmadinejad, Terrorism, Nuclear Ambition, and the Middle East. Westport: Praeger Security International. Ali, Mohanad Hage (2018): Nationalism, Transnationalism, and Political Islam: Hizbullah’s Institutional Identi- ty. Cham: Palgrave Macmillan / Springer Nature. DOI: https://doi.org/10.1007/978-3-319-60426-8 Axworthy, Michael (2017): Iran: What Everyone Needs to Know. New York: Oxford University Press. Bassiri Tabrizi Aniseh; Pantucci, Raffaello (Eds.) (2016, August):Understanding Iran’s Role in the Syri-

ISSN 2334-3745 132 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 an Conflict. (RUSI Occasional Paper). URL: https://rusi.org/publication/occasional-papers/understand- ing-irans-role-syrian-conflict Bergman, Ronen (2008): The Secret War with Iran: The 30-Year Covert Struggle for Control of a “Rogue State”. (Ronnie Hope, Trans.). London: Oneworld. Berman, Ilan (2015): Iran’s Deadly Ambition: The Islamic Republic’s Quest for Global Power. New York: En- counter Books. Buchan, James (2012): Days of God: The Revolution in Iran and its Consequences.New York: Simon & Schus- ter. Byrne, Malcolm (2014): Iran-Contra: Reagan’s Scandal and the Unchecked Abuse of Presidential Power. Law- rence: University Press of Kansas. Canna, Sarah A. (Ed.) (2018, February): Prioritized Iranian Interests in the Middle East. (SMA Reach-back Re- port). URL: http://nsiteam.com/prioritized-iranian-interests-in-the-middle-east Chehabi, Houchang; Jafari, Peyman; Jefroudi, Maral (Eds.) (2015): Iran in the Middle East: Transnational Encounters and Social History. (International Library of Iranian Studies, Vol. 56). London: I.B. Tauris. Cohen, Ronen A. (2015): Revolution under Attack: The Forqan Group of Iran. New York: Palgrave Macmillan / Springer Nature. DOI: https://doi.org/10.1057/9781137502506 Cook, Alethia H.; Roshandel, Jalil (2009): The United States and Iran: Policy Challenges and Opportunities. New York: St. Martin’s Press. Coughlin, Con (2009): Khomeini’s Ghost: Iran since 1979. Basingstoke: Macmillan. Davis, Jacquelyn K.; Pfaltzgraff, Robert L., Jr. (2014):Anticipating a Nuclear Iran: Challenges for U.S. Security. New York: Columbia University Press. Deeb, Marius (2013): Syria, Iran, and Hezbollah: The Unholy Alliance and its War on Lebanon. Stanford: Hoover Institution Press. Dilegge, Dave; Keshavarz, Alma; Bunker, Robert J. (Eds.) (2016): Iranian and Hezbollah: Hybrid Warfare Ac- tivities. (A Small Wars Journal Anthology). Bloomington: iUniverse. Dorronsoro, Gilles; Grojean, Olivier (Eds.) (2018): Identity, Conflict and Politics in Turkey, Iran and Pakistan. (Comparative Politics and International Studies Series). New York: Oxford University Press. Farber, David (2005): Taken Hostage: The Iran Hostage Crisis and America’s First Encounter with Radical Islam. Princeton: Princeton University Press. Frantzman, J. (2019): After ISIS: America, Iran and the Struggle for the Middle East. Jerusalem: Gefen. Goldberg, Ori (2018): Faith and Politics in Iran, Israel, and the Islamic State: Theologies of the Real. Cam- bridge: Cambridge University Press. DOI: https://doi.org/10.1017/9781316336120 Golkar, Saeid (2015): Captive Society: The Basij Militia and Social Control in Iran. Washington, DC: Woodrow Wilson Center Press. Hobbs, Christopher; Moran, Matthew (2014): Exploring Regional Responses to a Nuclear Iran: Nuclear Domi- noes? London: Palgrave Pivot / Springer Nature. DOI: https://doi.org/10.1057/9781137369819 Ismail, Raihan (2016): Saudi Clerics and Shi’a Islam. New York: Oxford University Press. Jafarzadeh, Alireza (2007): The Iran Threat: President Ahmadinejad and the Coming Nuclear Crisis. New York: Palgrave Macmillan.

ISSN 2334-3745 133 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Katz, Yaakov; Hendel, Yoaz (2012): Israel vs. Iran: The Shadow War. Washington, DC: Potomac Books. Khalifé, Nabil (2017): The Attempt to Uproot Sunni-Arab Influence: A Geo-Strategic Analysis of the Western, Israeli and Iranian Quest for Domination. (Joseph A. Kéchichian, Trans.). Eastbourne: Sussex Academic Press. Knight, Nauzanin A. (2014): State Terrorism in Iran: Understanding the Case of the Iranian Bahá’í Community. Boca Raton: Dissertation.com. Mahallati, Mohammed Jafar Amir (2016): Ethics of War and Peace in Iran and Shi’i Islam. Toronto: University of Toronto Press. Maloney, Suzanne (Ed.) (2020): The Iranian Revolution at Forty. Washington, DC: Brookings Institution Press. Maloney, Suzanne (2021): Iran Reconsidered: The Nuclear Deal and the Quest for a New Moderation. [in press]. Washington, DC: Brookings Institution Press. McEachern, Patrick; O’Brien McEachern, Jaclyn (2018): , Iran, and the Challenge to International Order: A Comparative Perspective. (Routledge Global Security Studies). Abingdon: Routledge. Mousavian, Seyed Hossein; with Shahir Shahid Saless (2014): Iran and the United States: An Insider’s View on the Failed Past and the Road to Peace. New York: Bloomsbury. O’Hern, Steven (2012): Iran’s Revolutionary Guard: The Threat that Grows while America Sleeps. Washington, DC: Potomac Books. Ostovar, Afshon (2016): Vanguard of the Imam: Religion, Politics, and Iran’s Revolutionary Guards. New York: Oxford University Press. Ottolenghi, Emanuele (2011): The Pasdaran: Inside Iran’s Islamic Revolutionary Guard Corps. Washington, DC: FDD Press. Parsi, Trita (2017): Losing an Enemy: Obama, Iran, and the Triumph of Diplomacy. New Haven: Yale Universi- ty Press. Phillips, David L. (2017): The Kurdish Spring: A New Map of the Middle East. Abingdon: Routledge. (Original work published 2015) Povey, Tara (2015): Social Movements in Egypt and Iran. (Palgrave Studies in the History of Social Move- ments). Cham: Palgrave Macmillan / Springer Nature. DOI: https://doi.org/10.1057/9781137379009 Ramazani, R. K. (2013): Independence without Freedom: Iran’s Foreign Policy. Charlottesville: University of Virginia Press. Reisinezhad, Arash (2019): The Shah of Iran, the Iraqi Kurds, and the Lebanese Shia. (Middle East Today). Cham: Palgrave Macmillan / Springer Nature. DOI: https://doi.org/10.1007/978-3-319-89947-3 Rezaei, Farhad (2019): Iran’s Foreign Policy after the Nuclear Agreement: Politics of Normalizers and Tradition- alists. (Middle East Today). Cham: Palgrave Macmillan / Springer Nature. DOI: https://doi.org/10.1007/978- 3-319-76789-5 Richard, Yann (2019): Iran: A Social and Political History since the Qajars. Cambridge: Cambridge University Press. DOI: https://doi.org/10.1017/9781108569071 Saikal, Amin (2014): Zone of Crisis: Afghanistan, Pakistan, Iran and Iraq. London: I.B. Tauris. Saikal, Amin (2019): Iran Rising: The Survival and Future of the Islamic Republic. Princeton: Princeton Uni- versity Press. Sekulow, Jay (2016): Unholy Alliance: The Agenda Iran, Russia, and Jihadists Share for Conquering the World.

ISSN 2334-3745 134 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

New York: Howard Books. Seliktar, Ofira; Rezaei, Farhad (2020):Iran, Revolution, and Proxy Wars. (Middle East Today). Cham: Palgrave Macmillan / Springer Nature. DOI: https://doi.org/10.1007/978-3-030-29418-2 Shay, Shaul (2017): The Axis of Evil: Iran, Hizballah, and the Palestinian Terror. Abingdon: Routledge. (Origi- nal work published in 2005) Sinkaya, Bayram (2016): Revolutionary Guards in Iranian Politics: Elites and Shifting Relations. (Iranian Stud- ies, Vol. 25). Abingdon: Routledge. Sofaer, D. (2013): Taking on Iran: Strength, Diplomacy, and the Iranian Threat. Stanford: Hoover Institution Press. Tabaar, Mohammad Ayatollahi (2018): Religious Statecraft: The Politics of Islam in Iran. (Columbia Studies in Middle East Politics). New York: Columbia University Press. Uskowi, Nader (2019): Temperature Rising: Iran’s Revolutionary Guards and Wars in the Middle East. Lanham: Rowman & Littlefield. Vestenskov, David; Syed, Mahroona Hussain (2018): Carving Out a Vision for a Brighter Tomorrow: Cultivat- ing the Ground for Security Cooperation between Afghanistan, Iran, and Pakistan. (Conference Proceedings, No. 7 [b] 2018). [e-Book]. Copenhagen: Royal Danish Defence College. URL: http://www.fak.dk/biblioteket/ publikationer/Pages/CARVING%20OUT%20A%20VISION%20FOR%20A%20BRIGHTER%20TOMOR- R OW. a s px Wehrey, Frederic M. (Ed.) (2017): Beyond Sunni and Shia: The Roots of Sectarianism in a Changing Middle East. London: Hurst.

Theses Alghunaim, Ghadah Ghunaim Rashid (2014): Conflict between Saudi Arabia and Iran: An Examination of Critical Factors Inhibiting their Positive Roles in the Middle East. (Doctoral Thesis, Nova Southeastern Univer- sity, Fort Lauderdale, United States). URL: https://pqdtopen.proquest.com/pubnum/3687984.html Ashooh, Jessica P. (2011): Beltway Battles: Ideology and Infighting in US Foreign Policy toward the Middle East 2001-2006. (Doctoral Thesis, St. Antony’s College, Oxford, United Kingdom). URL:https://ora.ox.ac.uk/ob - jects/uuid:2d7b6074-1ac5-43ee-8095-6debb5e71896 Banihashemi, Mozafar (2012, December): Shi’ite Reformism versus Shi’ite Fundamentalism: A Comparative Study of Shi’ite Discursive Practices in 20th Century Iran: The Cases of Khomeini and Hakamizadeh. (Doctoral Thesis, University of New , Albuquerque, United States). URL:https://pqdtopen.proquest.com/pub - num/3553804.html Baumann, Michael R. (2011, April): „Do Svidanya‟ to Arms: Russian Commitments to Limit Conventional Arms Sales to Iran. (Master’s Thesis, Georgetown University, Washington, DC, United States). URL:https:// pqdtopen.proquest.com/pubnum/1491397.html Daigle, Claudia Campos (2004, August): State-Sponsored Terrorism: A Historical Comparative Analysis. (Mas- ter’s Thesis, San José State University, San José, United States). URL:https://doi.org/10.31979/etd.rkwx-5vvx El Habech, Mohamad (2018, June): Foreign-Backed Clients and Legitimacy: The Political Development of Iraq’s Shiite Militias (2005–2018). (Master’s Thesis, Naval Postgraduate School, Monterey, United States). URL: http://hdl.handle.net/10945/59651 Fagernes, Therese (2011, Spring):Persia Lost: How the Foreign Policy Hawks of the George W. Bush Adminis-

ISSN 2334-3745 135 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 tration Blocked Rapprochement with Iran. (Master’s Thesis, University of Oslo, Oslo, Norway). URL:http:// urn.nb.no/URN:NBN:no-29031 Feizi, Hiva (2018, March): Discourse, Affinity and Attraction: A Case Study of Iran’s Soft Power Strategy in Afghanistan. (Doctoral Thesis, University of South Florida, Tampa, United States). URL:https://pqdtopen. proquest.com/pubnum/10787971.html Field, Jeffrey (2007, December):Adversaries and Statecraft: Explaining U.S. Foreign Policy toward Rogue States. (Doctoral Thesis, University of Southern California, Los Angeles, United States). URL:http://digitallibrary. usc.edu/cdm/compoundobject/collection/p15799coll127/id/490523/rec/557 Hager, Anna (2012): Die MeK (die iranischen Volksmudschahedin - MKO) und die EU (2002-2009) – Kon- frontation, Interaktion. Synergien? (Master’s Thesis, Universität Wien, Vienna, Austria). DOI:https://doi. org/10.25365/thesis.18784 Haghirian, Mehran (2017): Effectuating a Cooperative Future between Iran and the Arab States of the Persian Gulf. (Master’s Thesis, American University, Washington, DC, United States). URL:https://pqdtopen.pro - quest.com/pubnum/10257078.html Hammond, Joseph (2010, January): The Unrelenting Rivals: Iran, Saudi Arabia, and the Organization of the Is- lamic Conference, 1979–1997. (Master’s Thesis, California State University, Long Beach, United States). URL: https://pqdtopen.proquest.com/pubnum/1486644.html Kamal, Melissa (2010, Spring): A Content Analysis of Elite U.S. Newspapers’ Coverage of Iran, 1979 and 2005. (Master’s Thesis, Nicholson School of Communication, Orlando, United States). URL:http://purl.fcla.edu/ fcla/etd/CFE0003077 Klein, Robyn W. (2011, Spring): States and Terrorist Groups that Collaborate: Strong Bonds, Sensitive Transfers and the Issue of Control. (Doctoral Thesis, University of California, Berkeley, United States). URL:https://es - cholarship.org/uc/item/5fn3z0jp Maiwandi, Nadia (2013, May): Framing Iran: The Islamic Revolution and the Green Movement as Told through Time Magazine. (Master’s Thesis, San José State University, San José, United States). URL:https://pqdtopen. proquest.com/pubnum/1541535.html Malone, Chad A. (2008, August): A Socio-Historical Analysis of U.S. State Terrorism from 1948 to 2008. (Master’s Thesis, University of Toledo, Toledo, United States). URL:http://rave.ohiolink.edu/etdc/view?acc_ num=toledo1216592463 Manghebati, Gelareh (2015): Almost Iranians: The Forgotten People of Iranian Balochistan: Exploring Armed Ethnic Conflict and Terrorism in Iranian Balochistan after the 1979 Islamic Revolution. (Master’s Thesis, Uni- versity of Manitoba, Winnipeg, Canada). URL: http://hdl.handle.net/1993/30755 Martin, Matthew Allen (2015, December): Conflict Politics Surrounding the Advent of ISIS: An Iranian Media Perspective. (Master’s Thesis, The University of Texas at Austin, Austin, United States). URL:http://hdl.han - dle.net/2152/34150 Nasrazadani, Ariana Mehnaz (2014): Iranian State Strength and Domestic Terrorism: How Iran Came to be the Cool Spot in a Hotbed of Terrorism. (Master’s Thesis, University of Kansas, Lawrence, United States). URL: http://hdl.handle.net/1808/25821 Nel, Coligny (2010, March): United States Foreign Policy and Nuclear Non-Proliferation: A Preliminary Com- parison of the Bush and Obama Administrations’ Approaches. (Master’s Thesis, Stellenbosch University, Stel- lenbosch, South Africa). URL: http://hdl.handle.net/10019.1/4129 Paris, Taylor (2017, August): The Rise and Geo-Political Significance of the Hezbollah. (Master’s Thesis, Ameri- can University of Paris, Paris, France). URL: https://pqdtopen.proquest.com/pubnum/27605884.html

ISSN 2334-3745 136 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Prince, William F. (2018, May): A Theoretical Analysis of the Capability of the Islamic Revolutionary Guards Corps and its Surrogates to Conduct Covert or Terrorist Operations in the Western Hemisphere. (Master’s Thesis, Harvard University, Cambridge, United States). URL:http://nrs.harvard.edu/urn-3:HUL.In - stRepos:42004011 Ranstorp, Magnus (1995): Radical Shi’ism in Lebanon: Western Government Crisis Management Techniques in Dealing with Hostage Incidents, 1982-1992. (Doctoral Thesis, University of St Andrews, St Andrews, United Kingdom). URL: http://hdl.handle.net/10023/15168 Rix, Derya (2013): United States Foreign Policy Towards Iran in the . (Doctoral Thesis, Durham University, Durham, United Kingdom). URL: http://etheses.dur.ac.uk/8483 Royston, Lisbet B. Ejlersen (2011, December): A Qualitative Pattern Analysis of Suicide Terrorism: From Past to Future Trends. (Master’s Thesis, Texas State University, San Marcos, United States). URL:https://digital. library.txstate.edu/handle/10877/4473 Spataro, Jason G. (2019, May): Iranian Cyber . (Master’s Thesis, Utica College, New York, United States). URL: https://pqdtopen.proquest.com/pubnum/13877649.html Tabatabaei, Behzad (2010, August): The Political Economy of Oil, Terrorism and Institutional Development in Iran and its Impact on the Middle East. (Doctoral Thesis, University of Southern California, Los Angeles, United States). URL: http://digitallibrary.usc.edu/cdm/ref/collection/p15799coll127/id/396749 Taylor, Ryan Preston (2019, May): Utilizing Strategic Culture as a Tool to Tailor U.S. Deterrence Policy towards Iran. (Master’s Thesis, Missouri State University, Springfield, United States). URL:https://bearworks.missou - ristate.edu/theses/3397 Tello, Roberto Ramiro (2008, Fall): Rapprochement: The Necessary Engagement with the Islamic Republic of Iran. (Master’s Thesis, University of Central Florida, Orlando, United States). URL:https://stars.library.ucf. edu/etd/3743 Thomas, Zachary Ross (2017):Putting the “Islam” in Islamism: Religious Language and the Model Muslim as Tools of Propaganda. (Master’s Thesis, University of Arizona, Tucson, United States). URL:http://hdl.handle. net/10150/625699 Thompson, Matthew K. (2016, September):National Security and Institutional Pathologies: A Path Dependent Analysis of U.S. Interventions in Iran, Guatemala, Cuba, and Iraq. (Master’s Thesis, Naval Postgraduate School, Monterey, United States). URL: http://hdl.handle.net/10945/50495 Veselý, Josef (2018, May): The Development of Russian-Iranian Relations in the Context of the Syrian Civil War. (Master’s Thesis, Leiden University, Leiden, The Netherlands). URL:http://hdl.handle.net/1887/62860 West, Graham F. (2016, May): The Case for Engagement: Building a Framework and Policy to Move U.S.-Ira- nian Relations Forward. (Master’s Thesis, George Washington University, Washington, DC, United States). URL: https://pqdtopen.proquest.com/pubnum/10159048.html Williams, Ann (2012): Representations of an Islamic Republic: Iran and the British Press since 1989. (Doc- toral Thesis, University of Manchester, Manchester, United Kingdom). URL:https://www.research.man - chester.ac.uk/portal/en/theses/representations-of-an-islamic-republic-iran-and-the-british-press-since- 1989(89f8ab74-29ca-4cee-8c10-a798f08ebc1e).html

Journal Articles and Book Chapters Abouaoun, Elie; Hamasaeed, Sarhang (2020, January): After the Soleimani Strike, What’s Next for Iraq and the Region? Small Wars Journal, 1/2020. URL: https://smallwarsjournal.com/index.php/jrnl/art/after-solei-

ISSN 2334-3745 137 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 mani-strike-whats-next-iraq-and-region Adelkhah, Nima (2015, May): Iran’s Changing Regional Strategy and its Implications for the Region. Ter- rorism Monitor, 13(10), 8-10. URL: https://jamestown.org/wp-content/uploads/2015/05/TerrorismMonitor- Vol13Issue10_03.pdf Adelkah, Nima (2015, June): Iranian Perspectives on Yemen’s Houthis. Terrorism Monitor, 13(13), 4-5. URL: https://jamestown.org/wp-content/uploads/2015/06/TerrorismMonitorVol13Issue13_01.pdf Adelkhah, Nima (2016, May): Iran and its Cyber-Terrorism Strategies. Terrorism Monitor, 14(10), 6-7. URL: https://jamestown.org/wp-content/uploads/2016/05/Terrorism_Monitor_Volume_XIV_Issue_02.pdf Adib-Moghaddam, Arshin (2013): What Is Radicalism? Power and Resistance in Iran. In: George Joffé (Ed.): Islamist Radicalisation in Europe and the Middle East: Reassessing the Causes of Terrorism. (Library of Interna- tional Relations, Vol. 51). London: I.B. Tauris, 269-299. Aghababaei, Hussein; Rezaei, Hassan (2010): Iran – Borders of an Islamic Republic in the Middle East. In: John A. Winterdyk; Kelly W. Sundberg (Eds.): Border Security in the Al-Qaeda Era. Boca Raton: CRC Press, 307-348. Ahmadian, Hassan; Mohseni, Payam (2019, March): Iran’s Syria Strategy: The Evolution of Deterrence.Inter - national Affairs, 95(2), 341-364. DOI: https://doi.org/10.1093/ia/iiy271 Ahrari, Ehsan (2016, March): Could Iran and the US Overcome their Mutual Animosity to Eradicate Daesh? Small Wars Journal, 3/2016. URL: https://smallwarsjournal.com/index.php/jrnl/art/could-iran-and-the-us- overcome-their-mutual-animosity-to-eradicate-daesh Akbarzadeh, Shahram (2015, Fall): Iran and Daesh: The Case of a Reluctant Shia Power. Middle East Policy, 22(3), 44-54. DOI: https://doi.org/10.1111/mepo.12142 Akbarzadeh, Shahram (2017, Fall): Iran’s Uncertain Standing in the Middle East. The Washington Quarterly, 40(3), 109-127. DOI: https://doi.org/10.1080/0163660X.2017.1370336 Akbarzadeh, Shahram; Barry, James (2017): Iran and Turkey: Not Quite Enemies but Less than Friends. Third World Quarterly, 38(4), 980-995. DOI: https://doi.org/10.1080/01436597.2016.1241139 Akbarzadeh, Shahram et al. (2019): The Kurds in Iran: Balancing National and Ethnic Identity in a Securi- tised Environment. Third World Quarterly, 40(6), 1145-1162. DOI: https://doi.org/10.1080/01436597.2019.15 92671 Al-Marashi, Ibrahim (2018): Iraq’s Shia Islamists after the Uprisings: The Impact of Intra-Sectarian Tensions and Relations with Iran. In: Hendrik Kraetzschmar; Paola Rivetti (Eds.): Islamists and the Politics of the Arab Uprisings: Governance, Pluralisation and Contention. Edinburgh: Edinburgh University Press, 274-290. Anderson, Sean K. (2005): US Counter-Insurgency vs. Iranian Sponsored Terrorism. In: Robert Bunker (Ed.): Networks, Terrorism and Global Insurgency. Abingdon: Routledge, 84-100. Ansari, Ali M. (2019): Iran: The State and Terrorism in Iran. In Michael J. Boyle (Ed.):Non-Western Responses to Terrorism. (New Directions in Terrorism Studies). Manchester: Manchester University Press, 364-384. Arterbury, John (2016, June): A Sacred Defense: Iranian Defense Policy in the Syrian Civil War. Georgetown Security Studies Review, 4(2), 4-12. URL: https://georgetownsecuritystudiesreview.org/wp-content/up- loads/2016/06/GSSR-Vol.-4-Iss.-2.pdf Asisian, Njdeh (2016, May): Shia Iran and Effects of Globalization on State and Religion: The Beginning of Post-Islamism Era. Small Wars Journal, 5/2016. URL: https://smallwarsjournal.com/jrnl/art/shia-iran-and-ef- fects-of-globalization-on-state-and-religion-the-beginning-of-post-islamism

ISSN 2334-3745 138 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Azamy, Hekmatullah; Siddique, Abubakar (2015, June): Taliban Reach Out to Iran. Terrorism Monitor, 13(12), 5-7. URL: https://jamestown.org/wp-content/uploads/2015/06/TerrorismMonitorVol13Issue12_02. pdf Bahgat, Gawdat (2020): Iran and its Neighbors Face Risks and Opportunities in Cyber Security. Orbis, 64(1), 78-97. DOI: https://doi.org/10.1016/j.orbis.2019.12.006 Bajoghli, Narges; Keshavarzian, Arang (2018): Iran and the Arab Uprisings. In: Mark L. Haas; David W. Lesch (Eds.): The Arab Spring: The Hope and Reality of the Uprisings.New York: Routledge, 174-193. Basit, Saira (2018): Explaining the Impact of Militancy on Iran–Pakistan Relations. Small Wars & Insurgen- cies, 29(5-6), 1040-1064. DOI: https://doi.org/10.1080/09592318.2018.1546362 Bayani, Farhad (2019): The Jurisprudence Trace Behind the DAESH Trench: Theoretical Basis of Islamic Fun- damentalism Focusing on Kurdistan Province of Iran. Asian Journal of Middle Eastern and Islamic Studies, 13(3), 370-386. DOI: https://doi.org/10.1080/25765949.2019.1630577 Becker, Michael (2017): Why Violence Abates: Imposed and Elective Declines in Terrorist Attacks. Terrorism and Political Violence, 29(2), 215-235. DOI: https://doi.org/10.1080/09546553.2015.1011799 Brandon, James (2018, January): Party for Free Life in Kurdistan: The PKK’s Iranian Wing Bides its Time. Terrorism Monitor, 16(1), 3-6. URL: https://jamestown.org/wp-content/uploads/2018/01/Terrorism-Moni- tor-January-15-2018.pdf Brennan, John (2008, July): The Conundrum of Iran: Strengthening Moderates without Acquiescing to Bellig- erence. The ANNALS of the American Academy of Political and Social Science, 618(1), 168-179. DOI: https:// doi.org/10.1177/0002716208316732 Byman, Daniel (2018): Confronting Iran. Survival, 60(1), 107-128. DOI: https://doi.org/10.1080/00396338.20 18.1427368 Chandler, Michael; Gunaratna, Rohan (2007): Iran – The Open Flank. In:Countering Terrorism: Can We Meet the Threat of Global Violence? London: Reaktion Books, 74-84. Clarke, Colin; Smyth, Phillip (2017, November): The Implications of Iran’s Expanding Shi`a Foreign Fighter Network. CTC Sentinel, 10(10), 14-18. URL: https://ctc.usma.edu/app/uploads/2017/11/CTC-Sentinel_Vo- l10Iss10-18.pdf Defort, Magdalena; McLaughlin, William Preston (2020, January): Iran’s Strategic Penetration of Latin Amer- ica: Consequences for U.S. Foreign Policy and National Security. Small Wars Journal, 1/2020. URL: https:// smallwarsjournal.com/index.php/jrnl/art/irans-strategic-penetration-latin-america-consequences-us-for- eign-policy-and-national Erlich, Reese (2014): Why Iran Backs Syria. In: Inside Syria: The Backstory of their Civil War and What the World Can Expect. New York: Prometheus Books, 145-166. Esfandiary, Dina; Tabatabai, Ariane (2015): Iran’s ISIS Policy. International Affairs, 91(1), 1-15. DOI: https:// doi.org/10.1111/1468-2346.12183 Esfandiary, Dina; Tabatabai, Ariane (2016): Yemen: An Opportunity for Iran–Saudi Dialogue? The Washing- ton Quarterly, 39(2), 155-174. DOI: https://doi.org/10.1080/0163660X.2016.1204415 Esfandiary, Dina; Tabatabai, Ariane M. (2017): A Comparative Study of U.S. and Iranian Counter-ISIS Strate- gies. Studies in Conflict & Terrorism, 40(6), 455-469. DOI: https://doi.org/10.1080/1057610X.2016.1221265 Feste, Karen A. (2016): The U.S.-Iran Hostage Crisis, 1979-1981. In: Terminate Terrorism: Framing, Gaming, and Negotiating Conflicts. (International Studies Intensives). Abingdon: Routledge, 99-138. (Original work published 2010)

ISSN 2334-3745 139 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Figelj, Nezka (2019): Iran and Religious Sectarianism in the Middle East: The Role of the European Union. Sicurezza, Terrorismo e Società, 9, 43-55. URL: http://www.sicurezzaterrorismosocieta.it/wp-content/up- loads/2019/06/SicTerSoc_9_Figelj-Iran-and-religious-sectarianism-in-the-Middle.pdf Findlater, Euan (2020, January): Islamic Republic of Iran’s Strategic Culture and National Security Anal- ysis. Small Wars Journal, 1/2020. URL: https://smallwarsjournal.com/index.php/jrnl/art/islamic-repub- lic-irans-strategic-culture-and-national-security-analysis Foroutan, Sayid Abbas; Tu, Anthony (2018): An Example of Chemical War: The Iran-. In: Anthony Tu: Chemical and Biological Weapons and Terrorism. Boca Raton: CRC Press, 49-64. Forozan, Hesam; Shahi, Afshin (2017, Winter): The Military and the State in Iran: The Economic Rise of the Revolutionary Guards. The Middle East Journal, 71(1), 67-86. DOI: https://doi.org/10.3751/71.1.14 Forteau, Mathias; Xiu, Alison See Ying (2018): The US Hostage Rescue Operation in Iran—1980. In: Tom Ruys; Olivier Corten; Alexandra Hofer (Eds.): The Use of Force in International Law: A Case-Based Approach. Oxford: Oxford University Press, 306-314. DOI [Book]: https://doi.org/10.1093/law/9780198784357.001.0001 Frantzman, Seth J. (2017, Fall-Winter): “By, With, And Through”: How the U.S.-Led Coalition Defeated the Islamic State in Iraq Using Tactics without Coherent Strategy for Confronting Iranian Influence.Middle East Review of International Affairs, 21(3), 1-13. Friedman, Brandon (2018): Iran’s Hezbollah Model in Iraq and Syria: Fait Accompli? Orbis, 62(3), 438-453. DOI: https://doi.org/10.1016/j.orbis.2018.05.005 Ghaddar, Hanin (2017, February): Perceiving the Shia Dimension of Terrorism. Georgetown Security Studies Review, Special Issue: What the New Administration Needs to Know about Terrorism and Counterterrorism, 15-19. URL: https://georgetownsecuritystudiesreview.org/wp-content/uploads/2017/02/GSSR-What-the- New-Administration-Needs-to-Know-About-Terrorism-and-Counterterrorism.pdf Ghosh, Arin Kumar (2020, January): The Ayatollah’s Gathering Aerial Storm.Small Wars Journal, 1/2020. URL: https://smallwarsjournal.com/jrnl/art/ayatollahs-gathering-aerial-storm Giles, Gregory F. (2009): “Like Glitter of the Sun”: Iran and Terrorism. In: Michael T. Kindt; Jerrold M. Post; Barry R. Schneider (Eds.): The World’s Most Threatening Terrorist Networks and Criminal Gangs. New York: Palgrave Macmillan, 71-92. Gledhill, John (2018, January): Review of “Existential Threats and Regulating Life: Securitization in the Con- temporary Middle East”, by Simon Mabon. Global Discourse, 8(1), 59-61. DOI: https://doi.org/10.1080/23269 995.2018.1408269 Goodarzi, Jubin (2019): Iran and the Syrian Civil War. In: Raymond Hinnebusch; Adham Saouli (Eds.): The War for Syria: Regional and International Dimensions of the Syrian Uprising. (Routledge/ St. Andrews Syrian Studies Series). Abingdon: Routledge, Chapter 9. Gray, Simon; Adeakin, Ibikunle (2019): Nigeria’s Shi’a Islamic Movement and Evolving Islamist Threat Land- scape: Old, New and Future Generators of Radicalization. African Security, 12(2), 174-199. DOI: https://doi. org/10.1080/19392206.2019.1639281 Grinberg, Alex (2015, Summer): Iran and Russia: Similarities and Implications for Decisionmaking. Middle East Review of International Affairs, 19(2), 26-33. URL: https://www.academia.edu/34527324/IRAN_AND_ RUSSIA_SIMILARITIES_AND_IMPLICATIONS_FOR_DECISIONMAKING Gross, Max L. (2013): Shi’a Muslims and Security: The Centrality of Iran. In: Chris Seiple; Dennis R. Hoover; Pauletta Otis (Eds.): The Routledge Handbook of Religion and Security. (Routledge Handbooks). Abingdon: Routledge, 57-68. Guillou, Nat (2017, July): The Future of Sunni Jihadist Violence in Iran.Terrorism Monitor, 15(15), 3-5. URL: ISSN 2334-3745 140 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 https://jamestown.org/wp-content/uploads/2017/07/Terrorism-Monitor-July-28-2017.pdf Hanau Santini, Ruth (2017): A New Regional Cold War in the Middle East and North Africa: Regional Secu- rity Complex Theory Revisited. The International Spectator, 52(4), 93-111. DOI: https://doi.org/10.1080/0393 2729.2017.1371487 Hargreaves-Heald, Nicholas (2018, May): Proving Ground: Iran’s Operational Strategy in Syria. Small Wars Journal, 5/2018. URL: https://smallwarsjournal.com/jrnl/art/proving-ground-irans-operational-strategy-syria Heras, Nicholas A. (2015, April): The Struggle for Syria’s al-Hasakah Governorate: Kurds, the Islamic State and the IRGC. Terrorism Monitor, 13(7), 8-11. URL: https://jamestown.org/wp-content/uploads/2015/04/Ter- rorismMonitorVol13Issue7_03.pdf Hoffman, Jon (2018, July): A Brewing Proto-Insurgency: Is Bahrain the Next Target of Iran’s Regional Am- bitions? Small Wars Journal, 7/2018. URL: https://smallwarsjournal.com/jrnl/art/brewing-proto-insurgen- cy-bahrain-next-target-irans-regional-ambitions Jaboori, Rafid (2018, October): Ahvaz Attack: Iran Blames U.S., Arab Rivals and Consolidates Control.Ter - rorism Monitor, 26(20), 6-7. URL: https://jamestown.org/wp-content/uploads/2018/10/TM-Oct.-19-Issue-1. pdf Jaboori, Rafid (2019, August): Iraqi Prime Minister’s Decree will not Undermine Power of Iran-Backed Militias. Terrorism Monitor, 17(16), 5-7. URL: https://jamestown.org/wp-content/uploads/2019/08/TM-Au- gust-9-2019-1.pdf Jaboori, Rafid (2019, November): Protests in Iraq Represent a Significant Challenge to Shia Militias.Terror - ism Monitor, 17(21), 6-8. URL: https://jamestown.org/wp-content/uploads/2019/11/TM-Nov.-6-2019-Issue. pdf Jayamaha, Buddhika (2019, Fall): The Great Saudi-Iranian Proxy Game. Middle East Quarterly, 26(4). URL: https://www.meforum.org/59294/the-great-saudi-iranian-proxy-game Jensehaugen, Jørgen (2019, September): A Palestinian Window of Opportunity? The PLO, the US and the Iranian Hostage Crisis. British Journal of Middle Eastern Studies. Advance Online Publication. DOI: https:// doi.org/10.1080/13530194.2019.1661646 Jiang, Zhen (2017): Confrontations on the Issue of Terrorism between Iran and the U.S. after 1979.Terrorism and Political Violence, 29(2), 236-253. DOI: https://doi.org/10.1080/09546553.2016.1254626 Juneau, Thomas (2016, May): Iran’s Policy towards the Houthis in Yemen: A Limited Return on a Modest Investment. International Affairs, 92(3), 647-663. DOI: https://doi.org/10.1111/1468-2346.12599 Karimi, Yusef; Cimbura, Alexandra; Loza, Wagdy (2019): Assessing the Prevalence of Middle Eastern Ex- treme Ideologies among some Iranians. Journal of Strategic Security, 12(3), 157-169. DOI: https://doi. org/10.5038/1944-0472.12.3.1719 Keshavarz, Alma (2015, November): Iran and Hezbollah in the Tri-Border Areas of Latin America: A Look at the “Old TBA” and the “New TBA”. Small Wars Journal, 11/2015. URL: https://smallwarsjournal.com/jrnl/art/ iran-and-hezbollah-in-the-tri-border-areas-of-latin-america-a-look-at-the-%e2%80%9cold-tba%e2%80%9d- and-the Keshavarz, Alma (2015, December): A Review of Iran’s Revolutionary Guards and Qods Force: Growing Global Presence, Links to Cartels, and Mounting Sophistication. Small Wars Journal, 12/2015. URL: https:// smallwarsjournal.com/jrnl/art/a-review-of-iran%e2%80%99s-revolutionary-guards-and-qods-force-grow- ing-global-presence-links-to-car Keshavarz, Alma (2016, March): Iran: al-Qaeda’s “Main Artery for Funds, Personnel and Communication.” The Recently Released Osama bin Laden Letters. Small Wars Journal, 3/2016. URL: https://smallwarsjournal. ISSN 2334-3745 141 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 com/jrnl/art/iran-al-qaeda%E2%80%99s-%E2%80%9Cmain-artery-for-funds-personnel-and-communica- tion%E2%80%9D-the-recently-released-o Knights, Michael (2018, September): The Houthi War Machine: From Guerrilla War to State Capture. CTC Sentinel, 11(8), 15-23. URL: https://ctc.usma.edu/app/uploads/2018/09/CTC-SENTINEL-092018.pdf Knights, Michael (2019, August): Iran’s Expanding Militia Army in Iraq: The New Special Groups.CTC Senti- nel, 12(7), 1-12. URL: https://ctc.usma.edu/app/uploads/2019/08/CTC-SENTINEL-072019.pdf Knights, Michael; Levitt, Matthew (2018, January): The Evolution of Shi`a Insurgency in Bahrain. CTC Senti- nel, 11(1), 18-25. URL: https://ctc.usma.edu/app/uploads/2018/01/CTC-Sentinel_Vol11Iss1-1.pdf Koudelka, Meaghan; Sandby-Thomas, Peter (2018, July): Morocco Flexes its Muscles over Western Sahara: An Analysis of Rabat’s Standoff with .Terrorism Monitor, 16(15), 8-13. URL: https://jamestown.org/ wp-content/uploads/2018/07/Terrorism-Monitor-July-28-2018.pdf Kousary, Halimullah (2015): Iran’s Strategic Designs for Afghanistan. In: Rohan Gunaratna; Douglas Woodall (Eds.): Afghanistan after the Western Drawdown. Lanham: Rowman & Littlefield, 77-84. Legrenzi, Matteo; Lawson, Fred H. (2016, Summer): Saudi Arabia Calls Out Hezbollah: Why Now? Middle East Policy, 23(2), 31-43. DOI: https://doi.org/10.1111/mepo.12193 Levitt, Matthew (2016, April): Iranian and Hezbollah Operations in South America: Then and Now.PRISM , 5(4), 119-134. URL: https://cco.ndu.edu/Portals/96/Documents/prism/prism_5-4/Iranian%20and%20Hez- bollah.pdf Levitt, Matthew (2018, August): Iran’s Deadly Diplomats. CTC Sentinel, 11(7), 10-15. URL: https://ctc.usma. edu/app/uploads/2019/01/CTC-SENTINEL-082018-final.pdf Levitt, Matthew (2019, March): Hezbollah’s Procurement Channels: Leveraging Criminal Networks and Partnering with Iran. CTC Sentinel, 12(3), 1-9. URL: https://ctc.usma.edu/app/uploads/2019/03/CTC-SEN- TINEL-032019.pdf Livermore, Douglas A. (2017, November): Dismantling Iran’s Illicit Networks. Small Wars Journal, 11/2017. URL: https://smallwarsjournal.com/jrnl/art/dismantling-irans-illicit-networks Lob, Eric (2018): Construction Jihad: State-Building and Development in Iran and Lebanon’s Shiʿi Territories. Third World Quarterly, 39(11), 2103-2125. DOI: https://doi.org/10.1080/01436597.2018.1460197 Lob, Eric; Habibi, Nader (2019, Summer): The Politics of Development and Security in Iran’s Border Provinc- es. The Middle East Journal, 73(2), 263-284. DOI: https://doi.org/10.3751/73.2.15 Loidolt, Bryce (2019, January): Iranian Resources and Shi`a Militant Cohesion: Insights from the Khazali Pa- pers. CTC Sentinel, 12(1), 21-24. URL: https://ctc.usma.edu/app/uploads/2019/01/CTC-SENTINEL-012019. pdf Mabon, Simon (2018): Existential Threats and Regulating Life: Securitization in the Contemporary Middle East. Global Discourse, 8(1), 42-58. DOI: https://doi.org/10.1080/23269995.2017.1410001 Mabon, Simon (2018): The Apocalyptic and the Sectarian: Identity, “Bare Life” and the Rise of Da’ish. In: Timothy Clack; Robert Johnson (Eds.): Before Military Intervention: Upstream Stabilisation in Theory and Practice. Cham: Palgrave Macmillan / Springer Nature, 165-190. DOI: https://doi.org/10.1007/978-3-319- 98437-7_8 Malmvig, Helle (2017): Wars within Wars: Regional Actors’ Involvement in the Battle for Syria. In: Rasmus Alenius Boserup et al. (Eds.): New Conflict Dynamics: Between Regional Autonomy and Intervention in the Middle East and North Africa. (Defence and Security Studies). [e-Book]. Copenhagen / Beirut: Danish Insti- tute for International Studies (DIIS) / American University of Beirut (AUB), 67-78. URL: https://pure.diis.dk/

ISSN 2334-3745 142 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 ws/files/841797/2017_DIIS_New_Conflict_Dynamics_in_the_Middle_East_and_North_Africa_web.pdf Mansour, Imad (2016): Statecraft in Iran. In: Statecraft in the Middle East: Foreign Policy, Domestic Politics and Security. (Library of International Relations, Vol. 80). London: I.B. Tauris, Chapter 7. Marashi, Reza (Interviewee); Borer, Doug (Interviewer) (2018, Spring): The CTAP Interview: Reza Marashi, National Iranian American Council. CTX, 8(1), 57-65. URL: http://liferayce3.globalecco.org/docu- ments/20126/54589/CTX81-CTAPinterviewRezaMarashi.pdf Marten, Kimberly (2015): Informal Political Networks and Putin’s Foreign Policy: The Examples of Iran and Syria. Problems of Post-Communism, 62(2), 71-87. DOI: https://doi.org/10.1080/10758216.2015.1010896 Martin, Vanessa (2017): Islamist Radicalism in the Provinces of Iran 1906–9: A Stage in the Development of Islamism. Middle Eastern Studies, 53(5), 687-699. DOI: https://doi.org/10.1080/00263206.2017.1288619 Mather, Yassamine (2014): The Arab Spring and its Unexpected Consequences.Critique: Journal of Socialist Theory, 42(1), 73-86. DOI: https://doi.org/10.1080/03017605.2014.909977 Mekhennet, Souad (2017): Threats: Bahrain, Iran, and Germany, 2011-2013. In:I Was Told to Come Alone: My Journey Behind the Lines of Jihad. New York: Henry Holt, 208-229. Milburn, Franc (2017, May): Iranian Kurdish Militias: Terrorist-Insurgents, Ethno Freedom Fighters, or Knights on the Regional Chessboard? CTC Sentinel, 10(5), 29-35. URL: https://ctc.usma.edu/app/up- loads/2017/05/CTC-Sentinel_Vol10Iss512.pdf Moaddel, Mansoor (2017): Monolithic Religious Markets, Fragmented State Structures, and Islamic Funda- mentalism among Iranians and across the Middle East and North Africa. Revue internationale des études du développement, 2017/1 (N° 229), 33-62. DOI: https://doi.org/10.3917/ried.229.0033 Moghadam, Assaf (2017): Low-End Cooperation: Al Qaeda, Iran, and Hizballah. In: Nexus of Global Jihad: Understanding Cooperation among Terrorist Actors. (Columbia Studies in Terrorism and Irregular Warfare). New York: Columbia University Press, 195-221. Moghadam, Assaf (2017, April): Marriage of Convenience: The Evolution of Iran and al-Qa`ida’s Tactical Cooperation. CTC Sentinel, 10(4), 12-18. URL: https://ctc.usma.edu/app/uploads/2017/05/CTC-Sentinel_Vo- l10Iss41.pdf Moghaddam, Fathali M. (2018): Iran-United States. In: Mutual Radicalization: How Groups and Nations Drive Each Other to Extremes. Washington, DC: American Psychological Association (APA), 59-74. Monier, Elizabeth (2015, Summer): Egypt, Iran, and the Hizbullah Cell: Using Sectarianism to “De-Arabi- ze” and Regionalize Threats to National Interests.The Middle East Journal, 69(3), 341-357. DOI: https://doi. org/10.3751/69.3.11 Naeini, Seyyed Moosa Kazemi; Alekajbaf, Hussein; Heydari, Bahareh (2017): Coping with Violence and Extremism at International Level and Position of Islamic Republic of Iran. Journal of Politics and Law, 10(4), 165-173. DOI: https://doi.org/10.5539/jpl.v10n4p165 Ohlers, C. Alexander (2018, February): The Uncertain Future of Iraq’s Popular Mobilization Units.Terrorism Monitor, 16(3), 8-11. URL: https://jamestown.org/wp-content/uploads/2018/02/TM_February-8-2018.pdf Oktav, Özden Zeynep (2015): The Syrian Civil War and Turkey-Syria-Iran Relations. Syria Studies, 7(2), 1-19. URL: https://ojs.st-andrews.ac.uk/index.php/syria/article/view/1116/867 Oktav, Özden Zeynep (2018): Understanding Iran’s Approach to Violent Non-State Actors: The ISIS and YPG Cases. In: Özden Zeynep Oktav; Emel Parlar Dal; Ali Murat Kurşun (Eds.): Violent Non-State Actors and the Syrian Civil War: The ISIS and YPG Cases. Cham: Springer International Publishing, 193-210. DOI: https:// doi.org/10.1007/978-3-319-67528-2_10

ISSN 2334-3745 143 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Oktav, Özden Zeynep (2019): Turkish-Iranian Relations in Syria: Between Rivalry and Engagement. In: Raymond Hinnebusch; Adham Saouli (Eds.): The War for Syria: Regional and International Dimensions of the Syrian Uprising. (Routledge/ St. Andrews Syrian Studies Series). Abingdon: Routledge, Chapter 11. Ostovar, Afshon (2018, November): Iran, its Clients, and the Future of the Middle East: The Limits of Reli- gion. International Affairs, 94(6), 1237-1255. DOI: https://doi.org/10.1093/ia/iiy185 Owen, John M., IV (2015): Watch Turkey and Iran. In: Confronting Political Islam: Six Lessons from the West’s Past. Princeton: Princeton University Press, 130-155. Patten, David A. (2015, Fall): Policy Brief: Defeating ISIS, Rolling Back Iran. Middle East Quarterly, 22(4). URL: https://www.meforum.org/middle-east-quarterly/pdfs/5479.pdf Paunic, Natalia (2016, Summer): The Rising Shi’a Crescent: Iranian Smart Power and Implications for the Middle East, Central Asia, and the Persian Gulf. Carleton Review of International Affairs, 3, 70-92. URL: https://doi.org/10.22215/cria.v3i0.120 Perkins, Brian M. (2019, July): US-Iran Tensions Overshadow Houthi Agenda in War in Yemen. Terrorism Monitor, 17(13), 7-8. URL: https://jamestown.org/wp-content/uploads/2019/07/TM-July-3-2019-1-1.pdf Pyszczynski, Tom et al. (2006, April): Mortality Salience, Martyrdom, and Military Might: The Great Sa- tan Versus the Axis of Evil. Personality and Social Psychology Bulletin, 32(4), 525-537. DOI: https://doi. org/10.1177/0146167205282157 Rabi, Uzi; Friedman, Brandon (2017, April): Weaponizing Sectarianism in Iraq and Syria. Orbis, 61(3), 423- 438. DOI: https://doi.org/10.1016/j.orbis.2017.04.003 URL: https://kundoc.com/pdf-weaponizing-sectarian- ism-in-iraq-and-syria-.html Ranstorp, Magnus (2016, January): Hezbollah’s Calculus after the Iran Nuclear Deal.CTC Sentinel, 9(1), 10- 13. URL: https://ctc.usma.edu/app/uploads/2016/01/CTC-SENTINEL-Vol9Iss15.pdf Rastegar, Kamran (2011): Global Frames on Afghanistan: The Iranian Mediation of Afghanistan in Interna- tional Art House Cinema after September 11, 2001. In: Zubeda Jalalzai; David Jefferess (Eds.):Globalizing Afghanistan: Terrorism, War, and the Rhetoric of Nation Building. Durham: Duke University Press, 145-164. Rezaei, Shahamak; Goli, Marco (2019): The Shia and the Sunni Islamic Radicalisation: Iran and Iraq. In: Routledge Handbook of Islamic Radicalisation. (Routledge Handbooks). Abingdon: Routledge, Chapter 20. Saad, Amal (2019, November): Challenging the Sponsor-Proxy Model: The Iran–Hizbullah Relationship. Global Discourse, 9(4), 627-650. DOI: https://doi.org/10.1332/204378919X15718898344883 Sadeghi-Boroujerdi, Eskandar (2017): Strategic Depth, Counterinsurgency, and the Logic of Sectarianization: The Islamic Republic of Iran’s Security Doctrine and its Regional Implications. In: Nader Hashemi; Danny Postel (Eds.): Sectarianization: Mapping the New Politics of the Middle East. New York: Oxford University Press, 159-184. Saouli, Adham (2019, November): Challenging the Sponsor-Proxy Model: The Iran–Hizbullah Relationship: A Reply to Saad. Global Discourse, 9(4), 651-653. DOI: https://doi.org/10.1332/204378919X15718898582320 Schmierer, Richard J. et al. (2016, Summer): The Saudi-Iranian Rivalry and the . Middle East Policy, 23(2), 5-30. DOI: https://doi.org/10.1111/mepo.12192 Shay, Shaul (2014): Iran and Terror Abductions. In: Global Jihad and the Tactic of Terror Abduction: A Com- prehensive Review of Islamic Terrorist Organizations. Eastbourne: Sussex Academic Press, 33-57. Sheehan, Ivan Sascha (2013, Fall): Challenging a Terrorist Tag in the Media: Framing the Politics of Re- sistance and an Iranian Opposition Group. Digest of Middle East Studies, 22(2), 229-261. DOI: https://doi. org/10.1111/dome.12033

ISSN 2334-3745 144 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Sheehan, Ivan Sascha (2015, Spring): Balancing Ends, Ways, and Means: The Case for Reviving Support for “Regime Change from Within” in Iran. The Journal on Terrorism and Security Analysis, 10, 27-36. URL: https://satsa.syr.edu/wp-content/uploads/2015/04/JTSA_Spring_2015.pdf Siddique, Abubakar (2018, July): Iran Ramps up Support to Taliban in Western Afghanistan. Terrorism Mon- itor, 16(15), 3-5. URL: https://jamestown.org/wp-content/uploads/2018/07/Terrorism-Monitor-July-28-2018. pdf Spahiu, Ebi (2018, October): MEK in —Potential Implications and Security Concerns for Albania. Terrorism Monitor, 16(19), 8-10. URL: https://jamestown.org/wp-content/uploads/2018/10/TM-Oct.-12- 2018-Issue.pdf Smith, Hayden J. (2018): Threats Won’t Work. Dynamics of Asymmetric Conflict: Pathways toward Terrorism and Genocide, 11(3), 149-159. DOI: https://doi.org/10.1080/17467586.2018.1432868 Soufan, Ali (2018, November): Qassem Soleimani and Iran’s Unique Regional Strategy. CTC Sentinel, 11(10), 1-12. URL: https://ctc.usma.edu/app/uploads/2018/11/CTC-SENTINEL-112018.pdf Soufan, Ali (2019, November): Next in Line to Lead al-Qa`ida: A Profile of Abu Muhammad al-Masri. CTC Sentinel, 12(10), 1-10. URL: https://ctc.usma.edu/app/uploads/2019/11/CTC-SENTINEL-102019.pdf Tabaar, Mohammad Ayatollahi (2018): The Hostage Crisis: The Untold Account of the Communist Threat. In: Religious Statecraft: The Politics of Islam in Iran. (Columbia Studies in Middle East Politics). New York: Co- lumbia University Press, 111-146. Tabatabai, Ariane (2017, September): Containment and Strike: Iran’s Drone Program. Terrorism Monitor, 15(17), 8-10. URL: https://jamestown.org/wp-content/uploads/2017/09/TM_September-11-2017.pdf Tabatabai, Ariane; Esfandiary, Dina (2017): Cooperating with Iran to Combat ISIS in Iraq. The Washington Quarterly, 40(3), 129-146. DOI: https://doi.org/10.1080/0163660X.2017.1370338 Taremi, Kamran (2015): At the Service of Hizbollah: The Iranian Ministry of Construction Jihad in Lebanon, 1988–2003. Politics, Religion & Ideology, 16(2-3), 248-262. DOI: https://doi.org/10.1080/21567689.2015.1080 164 Taylor, Paul W. (2017, September): Iranian Unconventional Warfare in Yemen. Small Wars Journal, 9/2017. URL: https://smallwarsjournal.com/jrnl/art/iranian-unconventional-warfare-in-yemen Terris, Christopher G. (2017, Spring): Iran at the WTO: The Future of U.S. State Sponsor of Terrorism Sanc- tions. New York University Journal of International Law and Politics, 49(3), 891-919. URL: https://nyujilp.org/ wp-content/uploads/2010/06/NYI304.pdf Trenta, Luca (2016): “We Are Sticking with the Shah”: The Carter Administration and Iran, 1977-1979. In: Risk and Presidential Decision-Making: The Emergence of Foreign Policy Crises. (Routledge Studies in US For- eign Policy). Abingdon: Routledge, 111-158. Tromblay, Darren E. (2017, April): The Washington Face of : Saudi Arabian and Irani- an Use of U.S. Lobbyists and other Proxies to Disrupt Decisive U.S. Decision-Making. Small Wars Journal, 4/2017. URL: https://smallwarsjournal.com/jrnl/art/the-washington-face-of-islamic-extremism-saudi-arabi- an-and-iranian-use-of-us-lobbyists-and- Tsukerman, Irina (2019, December): What Hasn’t Told You about Qatar and Iran. Small Wars Journal, 12/2019. URL: https://smallwarsjournal.com/jrnl/art/what-fox-news-hasnt-told-you-about-qatar- and-iran Vakilpour, Zohreh; Rastegari, Behnam (2018, October): The Need for Rehabilitation of Terrorists in Iran. Counter Terrorist Trends and Analyses, 10(10), 17-19. URL: https://www.rsis.edu.sg/wp-content/up- loads/2018/10/CTTA-October-2018.pdf ISSN 2334-3745 145 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Venger, Olesya (2016, April): The Strategic Use of News Coverage of the 2009 “Green Movement” in the US and Iranian Newspapers as Social Drama. Journal of Arab & Muslim Media Research, 9(1), 61-79. DOI: https://doi.org/10.1386/jammr.9.1.61_1 Wastnidge, Edward (2017, Summer): Iran and Syria: An Enduring Axis. Middle East Policy, 24(2), 148-159. DOI: https://doi.org/10.1111/mepo.12275 Wastnidge, Edward (2019, November): Transnational Identity Claims, Roles and Strategic Foreign Poli- cy Narratives in the Middle East. Global Discourse, 9(4), 605-625. DOI: https://doi.org/10.1332/20437891 9X15718897799871 Wege, Carl Anthony (2015, September): Urban and Rural Militia Organizations in Syria’s Less Governed Spaces. Journal of Terrorism Research, 6(3), 35-61. URL: https://doi.org/10.15664/jtr.1123 Weiss, Michael; Hassan, Hassan (2015): Agents of Chaos: Iran and Al Qaeda. In: ISIS: Inside the Army of Ter- ror. New York: Regan Arts, 48-67. Wigginton, Michael et al. (2015): Al-Qods Force: Iran’s Weapon of Choice to Export Terrorism. Journal of Policing, Intelligence and Counter Terrorism, 10(2), 153-165. DOI: https://doi.org/10.1080/18335330.2015.109 0053 Wilner, Alex (2018): The Dark Side of Extended Deterrence: Thinking through the State Sponsorship of Ter- rorism. Journal of Strategic Studies, 41(3), 410-437. DOI: https://doi.org/10.1080/01402390.2017.1284064 Windecker, Gidon; Sendrowicz, Peter (2016, December): Cold War in the Gulf: The Rivalry of Saudi and Ira- nian Narratives for Hegemony in the Middle East. KAS Auslandsinformationen, 4/2016, 80-95. URL: https:// www.kas.de/de/web/auslandsinformationen/artikel/detail/-/content/kalter-krieg-am-golf Winer, Jonathan M. (2008, July): Countering Terrorist Finance: A Work, Mostly in Progress. The AN- NALS of the American Academy of Political and Social Science, 618(1), 112-132. DOI: https://doi. org/10.1177/0002716208317696 Youngs, Richard (2014): Syria, Iran, and Regional Upheavals. In: Europe in the New Middle East: Opportunity or Exclusion? (Oxford Studies in Democratization). Oxford: Oxford University Press, 147-170. Zahed, Mosa (2017): The Evolution and Ascension of Iran’s Terror Apparatus. In: Paulo Casaca; Siegfried O. Wolf (Eds.): Terrorism Revisited: Islamism, Political Violence and State-Sponsorship. (Contemporary South Asian Studies). Cham: Springer International, 57-82. DOI: https://doi.org/10.1007/978-3-319-55690-1_3 Zahid, Farhan (2017, July): Jaish al-Adl’s Reemergence Threatens Iran-Pakistan Relations.Terrorism Monitor, 15(14), 6-7. URL: https://jamestown.org/wp-content/uploads/2017/07/Terrorism-Monitor-July-14-2017.pdf Zambelis, Chris (2015, April): Iran Confronts Intensifying Insurgent Offensive in Sistan-Balochistan Prov- ince. Terrorism Monitor, 13(8), 6-8. URL: https://jamestown.org/wp-content/uploads/2015/04/TerrorismMo- nitorVol13Issue8_02.pdf Zambelis, Chris (2015, August): Nuclear Agreement Overshadows Arab Unrest in Iranian Khuzestan. Ter- rorism Monitor, 13(16), 3-5. URL: https://jamestown.org/wp-content/uploads/2015/08/TerrorismMonitor- Vol13Issue16_01.pdf Zambelis, Chris (2017, June-July): Terror in Tehran: The Islamic State Goes to War with the Islamic Republic. CTC Sentinel, 10(6), 16-21. URL: https://ctc.usma.edu/app/uploads/2017/07/CTC-Sentinel_Vol10Iss6.pdf Zenn, Jacob (2019, July): A Shia “Boko Haram” Insurgency or Iranian Proxy in Nigeria? Not so Fast. Terror- ism Monitor, 17(15), 7-9. URL: https://jamestown.org/wp-content/uploads/2019/07/TM-July-26-2019.pdf

ISSN 2334-3745 146 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Grey Literature Alemzadeh, Maryam (2019, August): The Informal Roots of the IRGC and the Implications for Iranian Politics Today. (Crown Center for Middle East Studies, Middle East Brief No. 130). URL: https://www.brandeis.edu/ crown/publications/middle-east-briefs/pdfs/101-200/meb130.pdf al-Qarawee, Harith Hasan (2017, January): Sistani, Iran, and the Future of Shii Clerical Authority in Iraq. (Crown Center for Middle East Studies, Middle East Brief No. 105). URL: https://www.brandeis.edu/crown/ publications/middle-east-briefs/pdfs/101-200/meb105.pdf al-Smadi, Fatima (2015, September): Analysis: Hamas, Islamic Jihad Redefining Relations with Iran. [AMEC, Trans.]. (Aljazeera Centre for Studies Report). URL: https://studies.aljazeera.net/en/repor ts/2015/09/201592084340199169.html al-Smadi, Fatima (2017, March): Iran and the Arab Revolutions: Narratives Establishing Iran’s Monopolism. (Aljazeera Centre for Studies Report). URL: https://studies.aljazeera.net/en/reports/2017/03/iran-arab-revo- lutions-narratives-establishing-irans-monopolism-170318050125225.html Arab Center for Research and Policy Studies (ACRPS), Policy Analysis Unit (2016, January): Saudi-Iranian Tension: Roots and Implications of the Crisis. (Assessment Report). URL: https://www.dohainstitute.org/en/ PoliticalStudies/Pages/Saudi-Iranian_Tension_Roots_and_Implications_of_the_Crisis.aspx Arab Center for Research and Policy Studies (ACRPS), Policy Analysis Unit (2018, February): Israel and Iran Battle out over Syrian Skies. (Situation Assessment). URL: https://www.dohainstitute.org/en/PoliticalStudies/ Pages/The-Israeli-Aggression-on-Syrian-Territory-and-the-Prospects-of-the-Israeli-Iranian-confrontation. aspx Arab Center for Research and Policy Studies (ACRPS), Policy Analysis Unit (2018, April): Israeli-Iranian Es- calation: A Direct Confrontation on the Horizon? (Situation Assessment). URL: https://www.dohainstitute.org/ en/PoliticalStudies/Pages/Israeli-Iranian-escalation-In-Syria-and-the-potential-for-confrontation.aspx Arab Center for Research and Policy Studies (ACRPS), Policy Analysis Unit (2018, May): Iranian-Israeli Escalation in Syria. (Situation Assessment). URL: https://www.dohainstitute.org/en/PoliticalStudies/Pages/ Israeli-Iranian-Escalation.aspx Arab Center for Research and Policy Studies (ACRPS), Unit for Political Studies (2019, September): Iraq’s Di- lemma: The Uncertain Future of the Popular Mobilization Forces. (Situation Assessment). URL: https://www. dohainstitute.org/en/PoliticalStudies/Pages/Future-of-the-Popular-Mobilization-Forces-on-Iraq.aspx Arab Center for Research and Policy Studies (ACRPS), Unit for Political Studies (2020, January): US Iran Tensions at Boiling Point: How will Iran Respond to the Assassination of Qassem Soleimani? (Situation Assess- ment). URL: https://www.dohainstitute.org/en/PoliticalStudies/Pages/US-Iran-Crisis-How-will-Iran-Re- spond-to-the-Assassination-of-Qassem-Soleimani.aspx Bauer, Katherine (2018, September): Survey of Terrorist Groups and their Means of Financing. (Testimony sub- mitted to the House Financial Services Subcommittee on Terrorism and Illicit Finance, September 7, 2018). URL: https://www.washingtoninstitute.org/policy-analysis/view/survey-of-terrorist-groups-and-their-means- of-financing Bodansky, Yossef (2016, January): More Heretical Musings on the Coming End-of-Time Battle. (ISPSW Strate- gy Series: Focus on Defense and International Security, Issue No. 398). URL: http://www.ispsw.com/wp-con- tent/uploads/2016/01/398_Bodansky.pdf Bodansky, Yossef (2016, January): The Evolution of Russian, Syrian, and Iranian Actions against the Jihadist Movements and Turkish-U.S. Responses. (ISPSW Strategy Series: Focus on Defense and International Security, Issue No. 394). URL: http://www.ispsw.com/wp-content/uploads/2016/01/394_Bodansky.pdf

ISSN 2334-3745 147 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Bucala, Paul (2017, February): Iran’s New Way of War in Syria. (ISW / CT Report). URL: http://www.under- standingwar.org/backgrounder/irans-new-way-war-syria Cafarella, Jennifer; with Omer Kassim (2017, November): Iran’s Role in the Kirkuk Operation in Iraq. (ISW Study). URL: http://www.understandingwar.org/backgrounder/iran%E2%80%99s-role-kirkuk-operation-iraq Canadian Security Intelligence Service (CSIS) (2016, January): Regional Implications of the Saudi-Iranian Rivalry. In: The Foreign Fighters Phenomenon and Related Security Trends in the Middle East: Highlights from the Workshop. (World Watch: Expert Notes Series Publication No. 2016-01-01), 109-114. URL: https://www. canada.ca/en/security-intelligence-service/corporate/publications/the-foreign-fighters-phenomenon-and-re- lated-security-trends-in-the-middle-east.html Casaca, Paulo; Wolf, Siegfried O. (2017, June): Waging Jihad by Other Means: Iran’s Drug Business and its Role within the International Crime-Terror Nexus. (SADF Working Paper, Issue n° 5). URL: https://www.sadf.eu/ sadf-working-paper-5-waging-jihad-means-irans-drug-business-role-within-international-crime-terror-nex- us-paulo-casaca-siegfried-o-wolf Christensen, Janne Bjerre (2016, December): Guests or Trash: Iran’s Precarious Policies towards the Afghan Refugees in the Wake of Sanctions and Regional Wars. (DIIS Report). URL: https://www.diis.dk/en/research/ afghans-as-a-bargaining-chip Clawson, Patrick; Ghaddar, Hanin; Uskowi, Nader (2018, January): Middle East FAQs Volume 1: What is the Shia Crescent? [Video]. (The Washington Institute for Near East Policy, Policy Analysis: Interviews and Presentations). URL: https://www.washingtoninstitute.org/policy-analysis/view/middle-east-faqs-volume-1- what-is-the-shia-crescent Cordesman, Anthony H. (2020, January): The Gulf and Iran’s Capability for Asymmetric Warfare. (CSIS Work- ing Paper). URL: https://www.csis.org/analysis/gulf-and-irans-capabilities-asymmetric-warfare Cordesman, Anthony H.; Toukan, Abdullah; with the Assistance of Max Molot (2019, December): The Gulf Military Balance in 2019: A Graphic Analysis. (CSIS Working Paper). URL: https://www.csis.org/analysis/gulf- military-balance-and-us-commitments-gulf Cordesman, Anthony H.; with the assistance of Nicholas Harrington (2018, December): The Arab Gulf States and Iran: Military Spending, Modernization, and the Shifting Military Balance.(CSIS Report). URL: https:// www.csis.org/analysis/arab-gulf-states-and-iran-military-spending-modernization-and-shifting-military-bal- ance Dabashi, Hamid (2015, July): Iran, the US and the Arab World: The Dynamics of Counterrevolutionary Forces. (ACRPS Policy Analysis). URL: https://www.dohainstitute.org/en/PoliticalStudies/Pages/Iran_the_US_and_ the_Arab_World_The_Dynamics_of_Counterrevolutionary_Forces.aspx Daly, Galip (2017, December): Evolution of Turkey – Iraqi Kurdistan’s Relations. (Aljazeera Centre for Stud- ies Report). URL: https://studies.aljazeera.net/en/reports/2017/12/evolution-turkey-iraqi-kurdistans-rela- tions-171220092851950.html Dekel, Udi; Valensi, Carmit (2017, August): The Iranian Threat in Syria: As Bad as it Seems? (INSS Insight No. 967). URL: http://www.inss.org.il/publication/iranian-threat-syria-bad-seems Dury-Agri, Jessa Rose; Kassim, Omer; Martin, Patrick (2017, December): Iraqi Security Forces and Popular Mobilization Forces: Orders of Battle. (ISW Report). URL: http://www.understandingwar.org/report/iraqi-se- curity-forces-and-popular-mobilization-forces-orders-battle-0 Eisenstadt, Michael (2015, November): The Strategic Culture of the Islamic Republic of Iran: Religion, Expe- diency, and Soft Power in an Era of Disruptive Change. (MES Monographs, No. 7; expanded & rev. 2nd ed.). URL: https://www.washingtoninstitute.org/policy-analysis/view/the-strategic-culture-of-the-islamic-repub- lic-of-iran-religion-expediency-a ISSN 2334-3745 148 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Engel, Eliot L. (Chairman) et al. (2020, January): From Sanctions to the Soleimani Strike to Escalation: Eval- uating the Administration’s Iran Policy. (Hearing before the House Committee on Foreign Affairs, January 14, 2020). URL: https://foreignaffairs.house.gov/2020/1/from-sanctions-to-the-soleimani-strike-to-escala- tion-evaluating-the-administration-s-iran-policy Esfandiary, Dina (2019, November): Trump-Iran: The Political Ironies of “Maximum Pressure” versus “Maximum Resistance”. (Aljazeera Centre for Studies Report). URL: https://studies.aljazeera.net/en/re- ports/2019/11/trump-iran-political-ironies-maximum-pressure-maximum-resistance-191114110218958. html Ezzeddine, Nancy; Sulz, Matthias; van Veen, Erwin (2019, July): The Hashd Is Dead, Long Live the Hashd! (CRU Report). URL: https://www.clingendael.org/publication/hashd-dead-long-live-hashd Faramarzi, Scheherezade (2018, April): Iran’s Sunnis Resist Extremism, but for How Long? (Atlantic Council Issue Brief). URL: https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/iran-s-sunnis-resist- extremism-but-for-how-long Felbab-Brown, Vanda (2019, June): Pitfalls of the Paramilitary Paradigm: The Iraqi State, Geopolitics, and Al-Hashd Al-Shaabi. (Policy Brief; Brookings Institution / United Nations University Centre for Policy Re- search). URL: https://www.brookings.edu/research/pitfalls-of-the-paramilitary-paradigm-the-iraqi-state- geopolitics-and-al-hashd-al-shaabi Fitzpatrick, Mike (Chairman) et al. (2016, July): Iran Nuclear Deal and its Impact on Terrorism Financing. (Hearing before the United States House of Representatives Committee on Financial Services, July 22, 2015). URL: https://www.hsdl.org/?abstract&did=791082 Fox, Emma (2019, May): Islamic Human Rights Commission: Advocating for the Ayatollahs. (CRT Re- port). URL: https://henryjacksonsociety.org/publications/islamic-human-rights-commission-advocat- ing-for-the-ayotollahs Ghaddar, Hanin (2018, September): Iran and Hezbollah in Syria: U.S. Policy Options. (Testimony submitted to the House Foreign Affairs Subcommittee on Middle East and North Africa, September 27, 2018). URL: https://www.washingtoninstitute.org/policy-analysis/view/iran-and-hezbollah-in-syria-u.s.-policy-options Ghaddar, Hanin (Ed.) (2018, February): Iran’s Foreign Legion: The Impact of Shia Militias on U.S. Foreign Policy. (The Washington Institute for Near East Policy, Policy Notes, PN46). URL:https:// www.washingtonin- stitute.org/policy-analysis/view/irans-foreign-legion-the-impact-of-shia-militias-on-u.s.-foreign-policy Ghaddar, Hanin; Smyth, Phillip (2018, February): Rolling Back Iran’s Foreign Legion. [Video]. (The Washing- ton Institute for Near East Policy, PolicyWatch 2926). URL: https://www.washingtoninstitute.org/policy-anal- ysis/view/rolling-back-irans-foreign-legion Goldberg, Ori (2018, July): Iran and Shi’ite Terrorism: The Decision-Making System in Iran and the Balance of Power between Centers of Power. (ICT Articles). URL: https://www.ict.org.il/Article/2233/Iran_and_ Shi%E2%80%99ite_Terrorism Goldberg, Ori et al. (2019, October): Iran and the Houthi in Yemen. (ICT Iran and Shi’ite Terrorism Desk Report). URL: http://www.ict.org.il/Article/2458/Iran_and_the_Houthi_in_Yemen_(2019) Hatahet, Sinan (2019, March): Russia and Iran: Economic Influence in Syria. (Chatham House, Middle East and North Africa Programme Research Paper). URL: https://www.chathamhouse.org/publication/rus- sia-and-iran-economic-influence-syria Heras, Nicholas (2017, September): Gray Zones in the Middle East. (CNAS Report). URL: https://www.cnas. org/publications/reports/gray-zones-in-the-middle-east Herzog, Michael (2017, December): The Growing Risk of an Israel-Iran Confrontation in Syria. (The Wash-

ISSN 2334-3745 149 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 ington Institute for Near East Policy, Policy Notes, PN43). URL: https://www.washingtoninstitute.org/poli- cy-analysis/view/the-growing-risk-of-an-israel-iran-confrontation-in-syria Herzog, Michael (2019, July): Iran across the Border: Israel’s Pushback in Syria. (The Washington Institute for Near East Policy, Policy Notes, No. 66). URL: https://www.washingtoninstitute.org/policy-analysis/view/iran- across-the-border-israels-pushback-in-syria Ighani, Helia (2016, October): Managing the Saudi-Iran Rivalry: Insights from a CFR Workshop. (Report). URL: https://www.cfr.org/report/managing-saudi-iran-rivalry International Crisis Group (ICG) (2016, December): Turkey and Iran: Bitter Friends, Bosom Rivals. (Middle East Briefing N°51). URL:https://www.crisisgroup.org/middle-east-north-africa/gulf-and-arabian-peninsula/ iran/b051-turkey-and-iran-bitter-friends-bosom-rivals International Crisis Group (ICG) (2018, February): Israel, Hizbollah and Iran: Preventing Another War in Syria. (Middle East Report N°182). URL: https://www.crisisgroup.org/middle-east-north-africa/eastern-med- iterranean/syria/182-israel-hizbollah-and-iran-preventing-another-war-syria International Crisis Group (ICG) (2018, April): Iran’s Priorities in a Turbulent Middle East. (Middle East Report N°184). URL: https://www.crisisgroup.org/middle-east-north-africa/gulf-and-arabian-peninsula/ iran/184-irans-priorities-turbulent-middle-east International Crisis Group (ICG) (2018, May): Saudi Arabia: Back to Baghdad. (Middle East Report N°186). URL: https://www.crisisgroup.org/middle-east-north-africa/gulf-and-arabian-peninsula/iraq/186-saudi-ara- bia-back-baghdad International Crisis Group (ICG) (2020, January): The Iran Nuclear Deal at Four: A Requiem? (Middle East Report N°210). URL: https://www.crisisgroup.org/middle-east-north-africa/gulf-and-arabian-peninsula/ iran/210-iran-nuclear-deal-four-requiem Jahanbani, Nakissa (2020, January): Beyond Soleimani: Implications for Iran’s Proxy Network in Iraq and Syria. (CTC Perspectives). URL: https://ctc.usma.edu/beyond-soleimani-implications-irans-proxy-net- work-iraq-syria Jamal, Ahmad Shuja (2019, March): The Fatemiyoun Army: Reintegration into Afghan Society. (USIP Spe- cial Report No. 443). URL: https://www.usip.org/publications/2019/03/fatemiyoun-army-reintegration-af- ghan-society Jones, Seth G. (2020, January): Containing Tehran: Understanding Iran’s Power and Exploiting its Vulnerabili- ties. (CSIS Transnational Threats Project Report). URL:https://www.csis.org/analysis/containing-tehran-un - derstanding-irans-power-and-exploiting-its-vulnerabilities Kagan, Frederick W. et al. (2016, January): Competing Visions for Syria and Iraq: The Myth of an Anti-ISIS Grand Coalition. (ISW / CTP Report; U.S. Grand Strategy: Destroying ISIS and Al Qaeda, Report Two). URL: http://www.understandingwar.org/report/competing-visions-syria-and-iraq-myth-anti-isis-grand-coalition Kagan, Frederick W. et al. (2020, January): Iranian Escalation Timeline. (ISW / CTP Analysis). URL: http:// www.understandingwar.org/backgrounder/iranian-escalation-timeline Karmon, Ely (2017, June): ISIS and the Sunni Separatists Aim Fire at Iran. (IEEE Opinion Document 62/2017). URL: http://www.ieee.es/en/contenido/noticias/2017/06/DIEEEO62-2017.html Karmon, Ely (2018, May): The Israeli-Iranian Confrontation in Syria. (ICT Article). URL: http://www.ict.org. il/Article/2203/The_Israeli-Iranian_Confrontation_in_Syria Karmon, Ely (2018, November): The Return of Iranian Terrorism to Europe. (ICT Article; RED-Alert project). URL: http://www.ict.org.il/Article/2287/Return_of_%20Iranian_Terrorism_to_Europe

ISSN 2334-3745 150 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Katzman, Kenneth (2019, November): Iran: Internal Politics and U.S. Policy and Options. (CRS Report for Congress RL32048). URL: https://fas.org/sgp/crs/mideast/RL32048.pdf Kendall, Elisabeth (2017, October): Iran’s Fingerprints in Yemen: Real or Imagined? (Atlantic Council Issue Brief). URL: https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/iran-s-fingerprints-in-ye- men-real-or-imagined Khalaji, Mehdi (2016, October): The Shiite Clergy Post-Khamenei: Balancing Authority and Autonomy. (The Washington Institute for Near East Policy, Research Notes, No. 37). URL: https://www.washingtoninstitute. org/policy-analysis/view/the-shiite-clergy-post-khamenei-balancing-authority-and-autonomy Khalaji, Mehdi (2017, February): The Future of Leadership in the Shiite Community. (The Washington Institute for Near East Policy, Policy Focus No. 152). URL: https://www.washingtoninstitute.org/policy-analysis/view/ the-future-of-leadership-in-the-shiite-community King, Peter T. (Chairman) et al. (2016, February): The Future of Iranian Terror and its Threat to the U.S. Homeland. (Hearing before the House Homeland Security Subcommittee on Counterterrorism and Intelli- gence, February 11, 2016; Serial No. 114–53). URL: https://www.hsdl.org/?abstract&did=797166 King, Peter T. (Chairman) et al. (2018, April): State Sponsors of Terrorism: An Examination of Iran’s Global Terrorism Network. (Hearing before the House Homeland Security Subcommittee on Counterterrorism and Intelligence, April 17, 2018; Serial No. 115–59). URL: https://www.hsdl.org/?abstract&did=816710 Knights, Michael (2017, October): How to Contain and Roll Back Iranian-Backed Militias. (Testimony submit- ted to the House Foreign Affairs Subcommittee on Terrorism, Nonproliferation, and Trade, October 4, 2017). URL: https://www.washingtoninstitute.org/policy-analysis/view/how-to-contain-and-roll-back-iranian- backed-militias Kozak, Christopher (2017, March): Iran’s Assad Regime. (ISW / CT Report). URL: http://www.understanding- war.org/backgrounder/irans-assad-regime Lahoud, Nelly (2019, February): Al-Qa’ida’s Contested Relationship with Iran: The View from Abbottabad. (Re- search Paper; New America / ASU Center on the Future of War). URL: https://www.newamerica.org/interna- tional-security/reports/al-qaidas-contested-relationship-iran Levitt, Matthew (2015, September): Major Beneficiaries of the Iran Deal: IRGC and Hezbollah. (Testimony submitted to the House Foreign Affairs Subcommittee on the Middle East and North Africa, September 17, 2015). URL: https://www.washingtoninstitute.org/policy-analysis/view/major-beneficiaries-of-the-iran-deal- irgc-and-hezbollah Levitt, Matthew; Knights, Michael (2017, January): Iranian-Backed Terrorism in Bahrain: Finding a Sustain- able Solution. (The Washington Institute for Near East Policy, PolicyWatch 2750). URL:https://www.washing - toninstitute.org/policy-analysis/view/iranian-backed-terrorism-in-bahrain-finding-a-sustainable-solution Lin, Christina (2020, January): China Might Take Iran’s Side in a War with US. (ISPSW Strategy Series: Fo- cus on Defense and International Security, Issue No. 665). URL: https://www.ispsw.com/wp-content/up- loads/2020/01/665_Lin.pdf Logan, Michael K.; Zimmerman, Lauren; Ligon, Gina S. (2019, August): Influential Violent Extremist Organi- zational Partners of Iran. (NSI Paper). URL: https://nsiteam.com/influential-violent-extremist-organization- al-partners-of-iran Maloney, Suzanne (2015, September): Major Beneficiaries of the Iran Deal: The IRGC and Hezbollah.(Testi - mony submitted to the House Foreign Affairs Subcommittee on the Middle East and North Africa, Septem- ber 17, 2015). URL: https://www.brookings.edu/testimonies/major-beneficiaries-of-the-iran-deal-the-irgc- and-hezbollah

ISSN 2334-3745 151 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Maloney, Suzanne (2017, September): The Roots and Evolution of Iran’s Regional Strategy. (Atlantic Council Issue Brief). URL: https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/the-roots-drivers- and-evolution-of-iran-s-regional-strategy Middle East Institute (MEI); Etana Syria (2019, October): Divide and Conquer: The Growing Hezbollah Threat to the . (MEI Policy Paper 2019-20). URL: https://www.mei.edu/publications/divide-and-conquer- growing-hezbollah-threat-druze Murciano, Gil (2017, October): Israel vis-à-vis Iran in Syria: The Perils of Active Containment. (SWP Comment 2017/C 41). URL: https://www.swp-berlin.org/en/publication/israel-and-irans-growing-influ- ence-in-syria Murciano, Gil (2018, July): Preventing a Spillover of the Iran-Israel Conflict in Syria. (SWP Comment 2018/C 27). URL: https://www.swp-berlin.org/en/publication/preventing-a-spillover-of-the-iran-israel-conflict-in- syria Mustafa, Mohammad Salih (2016, April): Iran’s Role in the Kurdistan Region. (Aljazeera Centre for Studies Report). URL: https://studies.aljazeera.net/en/reports/2016/04/160420105055207.html Nader, Alireza (2015): Iran’s Role in Iraq: Room for Cooperation? (RAND Perspectives, PE-151-OSD). DOI: https://doi.org/10.7249/PE151 Newlee, Danika; Jones, Seth G.; Bermudez, Joseph S., Jr. (2020, January): Signposts of Struggle: Iran’s Enduring Protest Movement. (CSIS Briefs). URL: https://www.csis.org/analysis/signposts-struggle-irans-enduring-pro- test-movement Orton, Kyle (2016, June): How the Iran Entente Caused the Syria Crisis. (HJS Centre for the New Middle East, Policy Paper No. 10). URL: https://henryjacksonsociety.org/publications/how-the-iran-entente-caused-the- syria-crisis Pagano, Sabrina (Ed.) (2018, March): Competition Short of Armed Conflict with a Regional Power: Lessons from the Gray Zone (and Beyond) for US-Iran Relations. (SMA Reach-back Report). URL: http://nsiteam.com/ competition-short-of-armed-conflict-with-a-regional-power Pahlavi, Reza; Doran, Michael (2020, January): The Future of Iran: A Conversation with Reza Pahlavi. (Hud- son Institute Discussion Transcript). URL: https://www.hudson.org/research/15647-transcript-the-future-of- iran-a-conversation-with-reza-pahlavi Pletka, Danielle (2017, October): Tehran Stands atop the Syria-Iran Alliance. (Atlantic Council Issue Brief). URL: https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/tehran-stands-atop-the-syria- iran-alliance Pollack, Kenneth M. (2017, December): Iran in Iraq. (Atlantic Council Issue Brief). URL: https://www.atlan- ticcouncil.org/in-depth-research-reports/issue-brief/iran-in-iraq Saab, Bilal Y. (2018, May): Beyond the Proxy Powder Keg: The Specter of War between Saudi Arabia and Iran. (Policy Paper 2-2018). URL: https://www.mei.edu/publications/beyond-proxy-powder-keg-specter-war-be- tween-saudi-arabia-and-iran Şaban, Navvar (2018, July): Iranian Involvement in Syria’s Southern Front. (Omran Special Report). URL: http://omranstudies.org/publications/reports/iranian-involvement-in-syria%E2%80%99s-southern-front. html Salem, Paul (2018, January): The Rise of Violent Transnational Movements in the Middle East: Historical Con- text, Dynamic Drivers and Policy Takeaways. (Middle East Institute Policy Paper 2018-1). URL: https://www. mei.edu/publications/rise-violent-transnational-movements-middle-east Schneider, Tobias (2018, October): The Fatemiyoun Division: Afghan Fighters in the Syrian Civil War. (MEI ISSN 2334-3745 152 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Policy Paper 2018-9). URL: https://www.mei.edu/publications/fatemiyoun-division-afghan-fighters-syri- an-civil-war Selvik, Kjetil (2015, October): War in Yemen: The View from Iran. (NOREF Expert Analysis). URL: https:// www.files.ethz.ch/isn/194322/3aa838bcc38767deb0af8f2125e20f36.pdf Shaikh, Shaan (2019, December): Iranian Missiles in Iraq. (CSIS Briefs). URL: https://www.csis.org/analysis/ iranian-missiles-iraq Shay, Shaul (2018, December): Iran and the Terror in Sistan-Baluchistan Province. (ICT Articles). URL: http:// www.ict.org.il/Article/2309/Iran_and_the_terror_in_Sistan Shay, Shaul (2019, April): The Threat of Iranian Armed Drones.(ICT Articles). URL: http://www.ict.org.il/ Article/2372/The_threat_of_Iranian_armed_drones Sial, Safdar (2015, April): An Analysis of Emerging Pakistani-Iranian Ties. (NOREF Report). URL: https:// www.files.ethz.ch/isn/190006/d7f90a473ca2847f0ccf74f31d02fb8e.pdf Slavin, Barbara (2016, May): Will Iran’s Human Rights Record Improve? (Atlantic Council, South Asia Center Issue Brief). URL: https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/will-iran-s-human- rights-record-improve Smyth, Phillip; Michetti, Tim; Daniels, Owen (2017, September): Revolution Unveiled: A Closer Look at Iran’s Presence and Influence in the Middle East. (Atlantic Council Report). URL: https://www.atlanticcouncil.org/ in-depth-research-reports/report/revolution-unveiled-a-closer-look-at-iran-s-presence-and-influence-in- the-middle-east Soufan Center, The (2019, May):Iran’s Playbook: Deconstructing Tehran’s Regional Strategy. (Report). URL: https://thesoufancenter.org/research/irans-playbook-deconstructing-tehrans-regional-strategy Spadoni, Giacomo (2019, April): IRGC Cyber-Warfare Capabilities. (ICT Cyber Desk Article; RED-Alert proj- ect). URL: http://www.ict.org.il/Article/2380/IRGC_Cyber-Warfare_Capabilities Speckhard, Anne (2017, March): Appointed or Elected Leaders as Part of the Answer for Addressing Violent Extremism in the Region: A View from Iran. (ICSVE Brief Reports). URL: https://www.icsve.org/appointed- or-elected-leaders-as-part-of-the-answer-for-addressing-violent-extremism-in-the-region-a-view-from-iran Spyer, Jonathan (2015, October): Tehran’s Servants: Iraq’s Shia Militias Emerge as the Key Armed Force Facing Islamic State in Iraq. (HJS Centre for the New Middle East, Policy Paper No. 6). URL: https://henryjacksonso- ciety.org/publications/tehrans-servants-iraqs-shia-militias-emerge-as-the-key-armed-forces-facing-is-in-iraq Steinberg, Guido (2017, July): The : Iran’s Most Important Instrument in Iraq. (SWP Com- ment 2017/C 26). URL: https://www.swp-berlin.org/en/publication/the-badr-organization-irans-instru- ment-in-iraq Tanchum, Micha’el (2019, May): Drone Attacks on Saudi Oil Infrastructure Are a Calibrated Message from Iran. (IAI Commentaries 19 | 35). URL: https://www.iai.it/en/pubblicazioni/drone-attacks-saudi-oil-infrastruc- ture-are-calibrated-message-iran Tarzi, Amin (2017, June): Iran, Russia, and the Taliban: Reassessing the Future of the Afghan State. (FPRI E-Notes). URL: https://www.fpri.org/article/2017/06/iran-russia-taliban-reassessing-future-afghan-state U.S. Government Accountability Office (U.S. GAO) (2014, September):Strategy to Counter Iran in the West- ern Hemisphere has Gaps that State Department Should Address. (Report to Congressional Requesters). URL: https://www.gao.gov/products/gao-14-834 Uskowi, Nader (2018, September): The Evolving Iranian Strategy in Syria: A Looming Conflict with Israel. (At- lantic Council, Scowcroft Center for Strategy and Security Issue Brief). URL:https://www.atlanticcouncil.org/

ISSN 2334-3745 153 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 publications/issue-briefs/the-evolving-iranian-strategy-in-syria-a-looming-conflict-with-israel Uskowi, Nader; Alfoneh, Ali; Vatanka, Alex (2018, December): The IRGC and Regional Conflict: Temperature Rising. [Video]. (Washington Institute for Near East Policy, PolicyWatch 3049). URL: https://www.washing- toninstitute.org/policy-analysis/view/the-irgc-and-regional-conflict-temperature-rising Wyss, Michel D. (2016, April): Iranian Proxy Warfare in Iraq and Yemen. (ICT Paper; Submission to the Rag- onis Scholarship 2015/2016). URL: https://www.ict.org.il/Article/1749/iranian-proxy-warfare-in-iraq-and- yemen

Note Whenever retrievable, URLs for freely available versions of subscription-based publications have been provided. Thanks to the Open Access movement, self-archiving of publications in institutional repositories, on professional networking sites, or author homepages for free public use (so-called Green Open Access) has become more common. Please note, that the content of Green Open Access documents is not necessarily identical to the officially published versions (e.g., in case of preprints); it might therefore not have passed through all editorial stages publishers employ to ensure quality control (peer review, copy and layout editing etc.). In some cases, articles may only be cited after obtaining permission by the author(s). About the Compiler: Judith Tinnes, Ph.D., is a Professional Information Specialist. Since 2011, she works for the Leibniz Institute for Psychology Information (ZPID). Additionally, she serves as Information Resources Edi- tor to ‘Perspectives on Terrorism’. In her editorial role, she regularly compiles bibliographies and other resources for Terrorism Research (for an inventory visit https://archive.org/details/terrorism-research-bibliographies). She wrote her doctoral thesis on Internet usage of Islamist terrorists and insurgents (focus: media-oriented hostage takings). E-mail: [email protected]

ISSN 2334-3745 154 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Recent Online Resources for the Analysis of Terrorism and Related Subjects Compiled and selected by Berto Jongman

Most of the items included became available online between December 2019 and February 2020. They are cat- egorized under twelve headings (as well as sub-headings, not listed below): 1. Non-Religious Terrorism 2. Religious Terrorism 3. Terrorist Strategies and Tactics 4. Conflict, Crime and Political Violence other than Terrorism 5. Extremism, Radicalization 6. Counterterrorism Strategies, Tactics and Operations 7. Specific Operations and/or Specific Policy Measures 8. Prevention, Preparedness and Resilience Studies 9. State Repression, Civil War and Clandestine Warfare 10. Intelligence Operations 11. Cyber Operations 12. Risk and Threat Assessments, Forecasts an Analytical Studies 13. Also Worth Reading/Watching N.B. Recent Online Resources for the Analysis of Terrorism and Related Subjects is a regular feature in ‘Perspec- tives on Terrorism’. For past listings, search under ‘Archive’ at www.universiteitleiden.nl/PoT

1. Non-Religious Terrorism Nigeria’s herder-farmer conflict.Conflict Armament Research, January 2020. URL: https://www.conflictarm. com/dispatches/nigerias-herder-farmer-conflict/ B. Daragahi. Libya heading towards ‘full-blown’ war despite ceasefire. The Independent, January 28, 2020. URL: https://www.independent.co.uk/news/world/africa/libya-ceasefire-war--russia-turkey-attack-lat- est-a9305921.html Tonight we bombed the US Capitol. The explosive story of M19, America’s first female terrorist group. New America, January 8, 2020. URL: https://www.newamerica.org/international-security/events/tonight-we- bombed-us-capitol/ M. Bell, A. Dewan. Libya summit calls for sanctions if ceasefire is violated.CNN , January 19, 2020. URL: https://edition.cnn.com/2020/01/19/world/libya-summit-intl/index.html K. Robinson. What’s at stake in Libya’s war? Council on Foreign Relations, January 16, 2020. URL: https://www. cfr.org/in-brief/whats-stake-libyas-war

ISSN 2334-3745 155 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Colombia says police foil attempt to assassinate FARC leader Timochenko. Reuters, January 12, 2020. URL: https://www.reuters.com/article/us-colombia-conflict/colombia-says-police-foil-attempt-to-assassi- nate-farc-leader-timochenko-idUSKBN1ZB0NK Libya’s war: who is supporting who. Al Jazeera, January 9, 2020. URL: https://www.aljazeera.com/news/2020/01/ libya-war-supporting-200104110325735.html?utm_source=Newsletter+Clingendael&utm_campaign=cab- be6ee4d-&utm_medium=email&utm_term=0_ec8de12e45-cabbe6ee4d-79915549 Statement by Iranian resistance on killing of Quds Force terror general. Tsarizm, January 3, 2020. URL: https:// tsarizm.com/news/middle-east/2020/01/03/statement-by-iranian-resistance-on-killing-of-quds-force-terror- general/ A. Nemtsova. War and corruption made Ukraine a terrorist twilight zone. , December 29, 2019. URL: https://www.thedailybeast.com/war-and-corruption-made-ukraine-a-terrorist-twilight-zone?fbclid=I- wAR11indZQhGhPIIGwZu6i0PwVxJM3GcCMJGxMdd-PIa7byFCiMkz3gFEPR8 J. Burke, Zeinab Mohammed Salih. Mercenaries flock to Libya raising fears of prolonged war. The Guardian, December 24, 2019. URL: https://www.theguardian.com/world/2019/dec/24/mercenaries-flock-to-libya-rais- ing-fears-of-prolonged-war Political party offices in Lebanon set alight after crackdown on protests. The Guardian, December 15, 2019. URL: https://www.theguardian.com/world/2019/dec/15/offices-of-two-major-parties-set-on-fire-lebanons- state-run-agency-reports SPLM/A-IO condemns attacks in Addar state, urges ceasefire.Sudan Tribune, December 10, 2019. URL: http:// www.sudantribune.com/spip.php?article68669 K. Lindijer. Xenofobie trekt Ethiopië uiteen. NRC Handelsblad, December 4, 2019. URL: https://www.nrc.nl/ nieuws/2019/12/04/xenofobie-trekt-ethiopie-uiteen-a3982576 - /handelsblad/2019/12/04/

2. Religious Terrorism

2.1. AQ and Affiliates

P. Henn. Taliban gunman who tried to kill Nobel Peace Prize laureate Malala boasts of escaping from jail in Pakistan. Daily Mail Online, February 9, 2020. URL: https://www.dailymail.co.uk/news/article-7982735/Tali- ban-gunman-tried-kill-Nobel-Peace-Prize-laureate-Malala-boasts-escaping-jail.html Jihadists built headquarters under Maarat al-Numan museum: video. Al Masdar News, February 3, 2020. URL: https://www.almasdarnews.com/article/jihadists-built-headquarters-under-maarat-al-numan-museum-vid- eo/ C. Weiss, J. Truzman. ‘Incite the Believers’ continues to fight Assad regime in southern Idlib. FDD’s Long War Journal, January 27, 2020. URL: https://www.longwarjournal.org/archives/2020/01/incite-the-believers-con- tinue-to-fight-assad-regime-in-southern-idlib.php T. Joscelyn. UN: al-Qaeda maintains close ties to Taliban despite talks with US. FDD’s Long War Journal, Jan- uary 29, 2020. URL: https://www.longwarjournal.org/archives/2020/01/un-al-qaeda-maintains-close-ties-to- taliban-despite-talks-with-u-s.php C. Gall. From armed struggle to peaceful protest, a road still to travel. The New York Times, January 31, 2020. URL: https://www.nytimes.com/2020/01/31/world/middleeast/from-armed-struggle-to-peaceful-protest-a- road-still-to-travel.html?fbclid=IwAR2eJS-y2KPkjo5KCS-IqDZ3MWEmA_6iqMzWymp7zwma_5TaNyZP- bXD98lY

ISSN 2334-3745 156 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

The Sahel: a complex web of crisis. RFI, January 31m 2020. URL: http://www.rfi.fr/en/international/20200131-sa- hel-complex-web-crises-burkina-faso-france-security-africa S. Yosef Agnon. Remorseful al-Shabaab defectors warn youths from joining al-Qaeda affiliated militia in -So malia. Strategic Intelligence, January 30, 2020. URL: https://intelligencebriefs.com/remorseful-al-shabaab-de- fectors-warn-youths-from-joining-al-qaeda-affiliated-militia-in-somalia/ Terror attacks drop, but Pakistan ‘not out of the woods’. Star Tribune, January 30, 2020. URL: http://www.star- tribune.com/terror-attacks-drop-but-pakistan-not-out-of-the-woods/567416952/ V. Dzutsati. Is political conflict supplanting insurgency as the main challenge in the North Caucasus?Eurasia Daily Monitor, 17(11), January 29, 2020. URL: https://jamestown.org/program/is-political-conflict-supplant- ing-insurgency-as-the-main-challenge-in-the-north-caucasus/ A. Roul. Al-Qaeda in Indian Subcontinent’s propaganda campaign continues despite digital disruptions and sti- fled operational capability.Terrorism Monitor, 18(2), January 28, 2020. URL: https://jamestown.org/program/ al-qaeda-in-indian-subcontinents-propaganda-campaign-continues-despite-digital-disruptions-and-sti- fled-operational-capability/?mc_cid=231efcff58&mc_eid=9942bc67e0 Taliban. Counter Extremism project, January 2020. URL: https://www.counterextremism.com/threat/taliban T. Joscelyn. Al-Qaeda’s senior leadership praises jihadists in Mali and Somalia. FDD’s Long War Journal, Jan- uary 20, 2020. URL: https://www.longwarjournal.org/archives/2020/01/al-qaeda-senior-leadership-praises-ji- hadists-in-mali-and-somalia.php J. Barigaba. AMISOM and US warn of resilient al-Shabaab. The EastAfrican, January 12, 2020. URL: https:// www.theeastafrican.co.ke/news/ea/Amisom-and-US-warn-of-resilient-al-Shabaab/4552908-5415346-cud- p31z/index.html Africa’s active militant Islamist groups. Threat from African militant Islamist groups expanding, diversifying. Africa Center for Strategic Studies, January 18, 2020. URL: https://africacenter.org/spotlight/threat-from-afri- can-militant-islamist-groups-expanding-diversifying/ ‘Optimistic’ Taliban aim to sign deal with US by end of month: report. The New Arab, January 18, 2020. URL: https://www.alaraby.co.uk/english/news/2020/1/18/optimistic-taliban-to-sign-deal-with-us-by-february S. Jarle Hansen. Horn, Sahel and Rift. Fault lines of the African jihad. 2019. URL: https://www.amazon.com/ Horn-Sahel-Rift-Fault-lines-African/dp/1849044147 H. Maruf. Al-Shabab attacks killed 4,000 in past decade, says data-gathering group. VOA, January 15, 2020. URL: https://www.voanews.com/africa/al-shabab-attacks-killed-4000-past-decade-says-data-gathering-group S. Hamid. To the mountains: my life in jihad from Algeria to Afghanistan. The New Arab, January 17, 2020. URL: https://www.alaraby.co.uk/english/society/2020/1/17/my-life-in-jihad-from-algeria-to-afghanistan C. Sands, F. Qazizai. Night letters: Gulbuddin Hekmatyar and the Afghan Islamist who changed the world. Hurst, 2019. URL: https://www.amazon.com/Night-Letters-Gulbuddin-Hekmatyar-tGulbuddin/dp/178738196X T. Hussein. To the mountains. My life in jihad from Algeria to Afghanistan. Hurst. URL: https://www.amazon. com/Mountains-Life-Jihad-Algeria-Afghanistan/dp/1787380114 S. Mednick. Islamic extremism wracks Burkina Faso, spreading east. , January 10, 2020. URL: https://apnews.com/2fcd44491ea7015a0895edab7b1bc6b4?utm_source=Twitter&utm_medium=AP_Af- rica&utm_campaign=SocialFlow C. Felter, J. Masters, M. Aly Sergie. Al Shabaab: backgrounder. Council on Foreign Relations, January 10, 2020. URL: https://www.cfr.org/backgrounder/al-shabab

ISSN 2334-3745 157 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

UN envoy: ’devastating surge’ of attacks in Sahel and West Africa. Al Jazeera, January 9, 2020. URL: https:// www.aljazeera.com/news/2020/01/envoy-devastating-surge-attacks-sahel-west-africa-200109011431355.html ‘Unprecedented terrorist violence’ in West Africa, Sahel region. UN, January 8, 2020. URL: https://news.un- .org/en/story/2020/01/1054981 Al-Shabaab warns of more attacks against Kenya, US interests. Punch, January 8, 2020. URL: https://punchng. com/al-shabaab-warns-of-more-attacks-against-kenya-us-interests/ M. Nyantaki Oti. The 77 percent – Africa’s resurgence of violent extremism. Deutsche Welle, January 7, 2020. URL: https://www.dw.com/en/the-77-percent-africas-resurgence-of-violent-extremism/av-51919377 Children among more than a dozen killed in Burkina Faso bombing, security sources day. France24, January 4, 2020. URL: https://www.france24.com/en/20200104-children-among-more-than-a-dozen-killed-in-burkina- faso-bombing-security-sources-say

2.2. Islamic State (IS)/Daesh and Affiliates

Thousands flee brutal attacks by armed groups in northern Mozambique. VOA, February 7, 2020. URL: https:// www.voanews.com/africa/thousands-flee-brutal-attacks-armed-groups-northern-mozambique C. Randall. Living with the ISIS terror threat. The Arab Weekly, February 2, 2020. URL: https://thearabweekly. com/living-isis-terror-threat?fbclid=IwAR1MJmd-Dv82GUvCIGLIeDV9b77EggS6wRWhgd5ydcEQyxGhe- hhm_HmJ0Ew ISIS’s spokesman calls on Muslims around the globe to spearhead the struggle to thwart President Trump’s plan and calls on ISIS operatives in Sinai and Syria to attack Israeli communities. The Meir Amit and Terror- ism Information Center, February 2, 2020. URL: https://www.terrorism-info.org.il/en/isiss-spokesman-calls- muslims-around-globe-spearhead-struggle-thwart-president-trumps-plan-calls-isis-operatives-sinai-syria- attack-israeli-communities/ P. Cruickshank. UN report warns ISIS is reasserting under new leader believed to be behind Yazidi genocide. CNN, January 29, 2020. URL: https://www.cbs58.com/news/un-report-warns-isis-is-reasserting-under-new- leader-believed-to-be-behind-yazidi-genocide?utm_source=dlvr.it&utm_medium=twitter C. Weiss. Jihadists in central Mali pledge allegiance to new Islamic State leader. FDD’s Long War Journal, Jan- uary 31, 2020. URL: https://www.longwarjournal.org/archives/2020/01/jihadists-in-central-mali-pledge-alle- giance-to-new-islamic-state-leader.php M. al-Lami. Islamic State’s declared war on Jews marks change in strategy. BBC Monitoring, January 30, 2020. URL: https://monitoring.bbc.co.uk/product/c201f64o E. Karmon. ISIS’s al-Qurashi’s declaration of war on Israel. International Institute for Counterterrorism, Jan- uary 28, 2020. URL: https://www.ict.org.il/Article/2492/ISIS’s_al-Qurashi‘s_declaration_of_war_on_Isra- el?fbclid=IwAR0iSSOCdQ-MXzA5v3KcifOtq-hdCJHsGzkZ_XrhIGi8ruRX3StQf1r7BHs - gsc.tab=0 J. Seldin. US officials uncover true identity of new Islamic State leader. VOA, January 29, 2020. URL: https:// www.voanews.com/middle-east/us-officials-uncover-true-identity-new-islamic-state-leader J. Burke. ISIS starting to reassert itself in Middle East heartlands, UN warns. The Guardian, January 30, 2020. URL: https://www.theguardian.com/world/2020/jan/30/isis-islamic-state-starting-reassert-itself-middle-east- heartlands-un-warns Daesh has escalated attacks in Iraq, Syria since US assassination of Iranian general: residents, monitors. PressTV, January 28, 2020. URL: https://www.presstv.com/Detail/2020/01/28/617314/Iran-Qassem-Soleima- ni-Daesh-Iraq-Syria-AP

ISSN 2334-3745 158 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

M. Herbert. Warning signs from Tunisia’s localized terrorist insurgency. Institute for Security Studies, January 29, 2020. URL: https://issafrica.org/iss-today/warning-signs-from-tunisias-localised-terrorist-insurgency J. Zenn. Is the ‘Bakura faction’ Boko Haram’s new force enhancer around Lake Chad? Terrorism Monitor, 18(2), January 28, 2020. URL: https://jamestown.org/program/is-the-bakura-faction-boko-harams-new-force-en- hancer-around-lake-chad/?mc_cid=231efcff58&mc_eid=9942bc67e0 E. Benari. ISIS threatens to shift its focus to Israel. Israel National News, January 28, 2020. URL: http://www. israelnationalnews.com/News/News.aspx/275198 R. Scarborough. ISIS leader’s confession gives gruesome look into atrocities. , January 26, 2020. URL: https://www.washingtontimes.com/news/2020/jan/26/shifa-al-nima-isis-leader-confessions- provide-look/ Report says top terrorist who oversaw operations around world is new IS chief. The Times of Israel, January 20, 2020. URL: https://www.timesofisrael.com/report-names-new-is-chief-as-top-terrorist-who-oversaw-opera- tions-around-world/ M. Chulov. ISIS founding member confirmed by spies as group’s new leader. The Guardian, January 20, 2020. URL: https://www.theguardian.com/world/2020/jan/20/isis-leader-confirmed-amir-mohammed-abdul-rah- man-al-mawli-al-salbi?CMP=Share_AndroidApp_LinkedIn J. Gant. ISIS’s new leader unmasked: sharia law graduate born into Iraqi Turkmen family is revealed as the hardliner now running the terror group after al-Baghdadi’s assassination.Daily Mail Online, January 20, 2020. URL: https://www.dailymail.co.uk/news/article-7908975/Sharia-law-graduate-born-Iraqi-Turkmen-fami- ly-revealed-hardliner-running-ISIS.html O. Roy. Will ISIS rise from the ashes? The World in 2020,ISPI, December 26, 2019. URL: https://www.ispion- line.it/en/publication/will-isis-rise-ashes-24677 J. Truzman. The ISIS insurgency in the Sinai continues despite Egyptian Army efforts.FDD’s Long War Jour- nal, January 17, 2020. URL: https://www.longwarjournal.org/archives/2020/01/the-isis-insurgency-in-the-si- nai-continues-despite-egyptian-army-efforts.php Judge, jury and executioner. The ISIS bureau of justice and grievances.Syria Justice and Accountability Centre, January 14, 2020. URL: https://syriaaccountability.org/wp-content/uploads/2020.01.14_ISIS_EN_PDF.pdf S. Asem. Rights group hopes new evidence of Islamic State ‘justice’ bureau can identify perpetrators. Middle East Eye, January 17, 2020. URL: https://www.middleeasteye.net/news/members-islamic-states-justice-bu- reau-could-be-prosecuted-atrocities-report-finds King Abdullah of Jordan warns Daesh on the rise again. Arab News, January 13, 2020. URL: https://www.arab- news.com/node/1612286/middle-east R. Fahey. ISIS welcomes the death of Iran’s Qaseem Soleimani and declare it an act of ‘divine intervention’ that will let them regroup in Iraq. Daily Mail Online, January 10, 2020. URL: https://www.dailymail.co.uk/news/ article-7874033/ISIS-welcome-death-Irans-Qaseem-Soleimani.html B. S. Sarmiento. ISIS terror risk to rise in south Philippines. Asia Times, December 30, 2019. URL: https://www. asiatimes.com/2019/12/article/isis-terror-risk-to-rise-in-south-philippines/ IS claims responsibility for New Year attack on police in Ingushetia. The Moscow Times, January 2, 2019. URL: https://www.themoscowtimes.com/2020/01/02/is-claims-responsibility-attack-police-ingushetia-a68795

ISSN 2334-3745 159 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

2.3. Other Groups/Organizations

G. Esfandiari. Iranian media confirm Quds Force involvement in foreign conflicts.RFE/RL , January 30, 2020. URL: https://www.rferl.org/a/iranian-media-confirm-quds-force-involvement-in-foreign-conflicts/30408664. html Soleimani’s militia ‘follow his instructions on Idlib even in death’, leaked recording suggests. The New Arab, January 27, 2020. URL: https://www.alaraby.co.uk/english/News/2020/1/27/Soleimanis-militia-still-follow-in- structions-of-dead-commander H. Baser. Palestine cancels 1995 signed with Israel. Anadolu Agency, January 31, 2020. URL: https:// www.aa.com.tr/en/jerusalem-red-line-for-muslims/palestine-cancels-1995-oslo-accords-signed-with-isra- el/1719730 Houthis’ all-female militia granted military ranking. Asharq al-Awsat, January 30, 2020. URL: https://aawsat. com/english/home/article/2106721/houthis’-all-female-militia-granted-military-ranking D. Hearst. Palestinians have only one option left: stay and fight. Middle East Eye, January 29, 2020. URL: https:// www.middleeasteye.net/opinion/palestinians-have-only-one-option-left-stay-and-fight B.M. Perkins. Magfuli’s reign and Tanzania’s creeping radicalization issue. Terrorism Monitor, 18(2), January 28, 2020. URL: https://jamestown.org/program/magufulis-reign-and-tanzanias-creeping-radicalization-is- sue/?mc_cid=231efcff58&mc_eid=9942bc67e0 Palestinian terrorism, 2019: overview and trends. The Meir Amit Intelligence & Terrorism Information Center, January 13, 2020. URL: https://www.terrorism-info.org.il/en/palestinian-terrorism-2019-overview-trends/ Palestinian mosque in Jerusalem set ablaze in arson attack. Middle East Monitor, January 24, 2020. URL: https:// www.middleeastmonitor.com/20200124-palestinian-mosque-in-jerusalem-set-ablaze-in-arson-attack/ T. Hilton, Y. Fazeli. Soleimani’s man: Abdul Reza Shahlai, Iran’s most senior commander in Yemen. Al Arabi- ya, January 14, 2020. URL: https://english.alarabiya.net/en/features/2020/01/11/Profile-Iran-s-military-com- mander-in-Yemen.html Biography of commander Qaani – al-Quds Force. Threadstrone71, January 3, 2020. URL: https://cybershafarat. com/2020/01/03/qaani/ E. Zuesse. Soleimani’s only public interview. Strategic Culture, January 18, 2020. URL: https://www.stra- tegic-culture.org/news/2020/01/18/soleimanis-only-public-interview/?fbclid=IwAR0XxWuAidtM6QBv- 4Ru-RhaQ3MW1L-R0bDR0jHHJ6z9bAb6t5gPEiOyK1_c Iran’s Khamenei: IRGC Quds are humanitarian organization with human values. The Jerusalem Post, Janu- ary 17, 2020. URL: https://www.jpost.com/Middle-East/Irans-Khamenei-to-address-nation-facing-unrest-at- home-pressure-abroad-614471 T. Joffre. Hamas calls for mass attendance at al-Aqsa, Cave of the prayers. The Jerusalem Post, Janu- ary 16, 2020. URL: https://www.jpost.com/Arab-Israeli-Conflict/Hamas-calls-for-mass-attendance-at-Al-Aq- sa-Cave-of-the-Patriarchs-prayers-614333 T. Oztas. Analysis – Libya and the Salafi pawns in the game. Anadolu Agency. January 9, 2020. URL: https:// www.aa.com.tr/en/africa/analysis-libya-and-the-salafi-pawns-in-the-game/1697641 K. Safieddine. Amid popular anger, Lebanon’s Hezbollah uses Soleimani’s killing to shore up shaken legitima- cy. The New Arab, January 13, 2020. URL: https://www.alaraby.co.uk/english/indepth/2020/1/13/hezbollah-us- es-soleimanis-killing-to-shore-up-shaken-legitimacy J. Wagemakers. Muslim Brotherhood and Salafism. In: P.R. Kumaraswamy (Ed.) The Palgrave Handbook of the Hashemite Kingdom of Jordan. Palgrave/MacMillan, 2019, pp.257-276. URL: https://www.academia.

ISSN 2334-3745 160 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

edu/41615070/Muslim_Brotherhood_and_Salafism_2019_?fbclid=IwAR0U7OHN99e81fdN-VqKsLBaJ5F_ 4joQhmgcrdr3-ArxodhSb0y32Lzycjo A. Quraishi. Why Iran’s Quds Force chose Esmail Qaani as Suleimani’s successor. The National, January 13, 2020. URL: https://www.thenational.ae/world/mena/why-iran-s-quds-force-chose-esmail-qaani-as-suleima- ni-s-successor-1.963967 M. Levitt. Iran retains its ability to launch terror attacks despite assassination. The National, January 3, 2020. URL: https://global4cast.org/2020/01/the-next-systemic-war-3-did-it-just-start-and-what-we-must-now- fight-for/ Hassan Nasrallah: attacks on Iraqi bases just the start. Al Jazeera, January 12, 2020. URL: https://www.aljazeera. com/news/2020/01/hassan-nasrallah-attacks-iraqi-bases-start-200112164659865.html Hezbollah: it’s time for Iran’s allies to start working to avenge Soleimani. Reuters, January 12, 2020. URL: https://uk.reuters.com/article/uk-iraq-security-hezbollah/hezbollah-its-time-for-irans-allies-to-start-work- ing-to-avenge-soleimani-idUKKBN1ZB0L5 A. Becker. Iran’s millionaire mullahs, the military, and the fight for foreign currency. Deutsche Welle, January 8, 2020. URL: https://www.dw.com/en/irans-millionaire-mullahs-the-military-and-the-fight-for-foreign-cur- rency/a-51934397 Iran’s Revolutionary Guards warn of ‘harsher revenge’ after strikes on US targets.Deutsche Welle, January 9, 2020. URL: https://www.dw.com/en/irans-revolutionary-guards-warn-of-harsher-revenge-after-stri- kes-on-us-targets/a-51936221 Y. Farouk. What does the US killing of Soleimani mean for Saudi Arabia? CEIP, January 7, 2020. URL: https:// carnegieendowment.org/2020/01/07/what-does-u.s.-killing-of-soleimani-mean-for-saudi-arabia-pub-80722 Who is Esmail Qaani? The new man leading Iran’s elite military force.BBC, January 7, 2020. URL: https://www. bbc.com/news/world-middle-east-51008996 A. Ahronheim. Who is the new Qasem Soleimani? Meet Esmail Qaani. The Jerusalem Post, January 6, 2020. URL: https://www.jpost.com/Middle-East/Who-is-the-new-IRGC-Quds-Force-leader-Esmail-Qaani-613260 S.J. Frantzman. Who was Abu Mahdi al-Muhandis, killed in US airstrike with Soleimani? The Jerusalem Post, January 6, 2020. URL: https://www.jpost.com/Middle-East/Who-was-Abu-Mahdi-al-Muhandis-killed-in-US- airstrike-with-Soleimani-613268 N. Karimi, J. Gambrell. Iran general replacing Soleimani vows ‘to get rid of America from the region.’ The Times of Israel, January 6, 2020. URL: https://www.timesofisrael.com/iran-general-replacing-soleimani-vows-re- venge-for-us-killing/ A. Soufan. Qassem Soleimani and Iran’s unique regional strategy. CTC Sentinel, 11(10), November 2019. URL: https://ctc.usma.edu/qassem-soleimani-irans-unique-regional-strategy/ Hezbollah leader says Soleimani killing marks new phase for region. Al Arabiyah, January 5, 2020. URL: https:// english.alarabiya.net/en/News/middle-east/2020/01/05/Lebanese-Hezbollah-chief-Soleimani-killing-marks- new-phase-for-the-region.html Iranian militias in Iraq: retaliation against US will begin Sunday night. Clarion Project, January 5, 2020. URL: https://clarionproject.org/soleimani-hit-iranian-militias-in-iraq-say-retaliation-ag-us-will-begin-sunday- night/ M. Behravesh. How Qassem Soleimani became guardian of Iran’s regional interests. Middle East Eye, January 5, 2020. URL: https://www.middleeasteye.net/news/how-qassem-soleimani-became-guardian-irans-region- al-interests

ISSN 2334-3745 161 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

F. Ridler. Qassem Soleimani’s ‘friend in battle’ who also served in Iran-Iraq war steps from the shadows to take over feared Quds Force. Daily Mail Online, January 4, 2020. URL: https://www.dailymail.co.uk/news/arti- cle-7851641/Qassem-Soleimanis-friend-battle-steps-shadows-feared-Quds-force.html K. Yacoub Oweis. Who is Esmail Qaani, the new Iranian elite force commander? The National, January 3, 2020. URL: https://www.thenational.ae/world/mena/who-is-esmail-qaani-the-new-iranian-elite-force-command- er-1.959505 Inside the plot by Iran’s Soleimani to attack US forces in Iraq. Reuters, January 4, 2020. URL: https://www. reuters.com/article/us-iraq-security-soleimani-insight/inside-the-plot-by-irans-soleimani-to-attack-u-s-forc- es-in-iraq-idUSKBN1Z301Z

3. Terrorist Strategies and Tactics D. Gartenstein-Ross, C.P. Clarke, M. Shear. Terrorists and technological innovation. Lawfare, February 2, 2020. URL: https://www.lawfareblog.com/terrorists-and-technological-innovation J. Bigio. Human trafficking helps terrorists earn money and strategic advantage. Foreign Policy, January 31, 2020. URL: https://foreignpolicy.com/2020/01/31/human-trafficking-helps-terrorists-earn-money-and-strate- gic-advantage/ R. van der Veer. Terrorism in the age of technology. Strategic Monitor 2019-2020. The Clingendael Institute/ HCSS, January 2020. URL: https://www.clingendael.org/pub/2019/strategic-monitor-2019-2020/terror- ism-in-the-age-of-technology/ D. Wambugu. Cryptocurrencies decentralized structure makes terrorist financing difficult to track: Chainaly- sis. Bitcoinexchangeguide, January 18, 2020. URL: https://bitcoinexchangeguide.com/cryptocurrencies-decen- tralized-structure-makes-terrorist-financing-difficult-to-track-chainalysis/ M.R. Torres-Soriano. To claim or not to claim: a study of terrorist disinformation. European Eye on Radicaliza- tion, January 13, 2020. URL: https://eeradicalization.com/to-claim-or-not-to-claim-a-study-of-terrorist-disin- formation/ L. Brown. ISIS urges followers to ‘ignite fires’ in forests across US and Europe. New York Post, November 6, 2019. URL: https://nypost.com/2019/11/06/isis-urges-followers-to-ignite-fires-in-forests-across-us-and-eu- rope/ Explosive violence in 2019. AOAV, January 7, 2020. URL: https://aoav.org.uk/2020/explosive-violence-in-2019/ Y. Schweizer, A. Mendelboim, D. Ayalon. Suicide bombings worldwide in 2019: signs of decline following the military defeat of the Islamic State. INSS, Insight #1244, January 2, 2020. URL: https://www.inss.org.il/pub- lication/suicide-bombings-worldwide-in-2019-signs-of-decline-following-the-military-defeat-of-the-islam- ic-state/?fbclid=IwAR3GSt6qNj5oTnfqap8s88ZpeqJnxfij6W9u3ACLROyGvvb11o0lzgSlz24 J. Spencer. The return of the tunnel bomb: a medieval tactic on the modern battlefield.Modern War Institute, December 30, 2019. URL: https://mwi.usma.edu/return-tunnel-bomb-medieval-tactic-modern-battlefield/ A. Kurth Cronin. Power to the people: How open technological innovation is arming tomorrow’s terrorists. 2019. URL: https://www.amazon.com/Power-People-Technological-Innovation-Terrorists/dp/019088214X A. Kurth Cronin. Power to the people. How open technological innovation is arming tomorrow’s terrorists. Newbooksnetwork.com, December 9, 2019. URL: https://newbooksnetwork.com/audrey-kurth-cronin-pow- er-to-the-people-how-open-technological-innovation-is-arming-tomorrows-terrorists-oxford-up-2019/

ISSN 2334-3745 162 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

4. Conflict, Crime and Political Violence other than Terrorism

4.1. Criminal Groups

P. Rexton Kan. El Chapo Bin Laden? Why drug cartels are not terrorist organizations. The Hague: ICCT, Feb- ruary 4, 2020. URL: https://icct.nl/publication/el-chapo-bin-laden-why-drug-cartels-are-not-terrorist-organi- zations/ J.P. Sullivan. What’s the potential for cross-border cartel corruption in the United States? Homeland Security Today, January 29, 2020. URL: https://www.hstoday.us/subject-matter-areas/border-security/whats-the-po- tential-for-cross-border-cartel-corruption-in-the-united-states/ Italy and launch global project to combat ‘Ndrangheta. INTERPOL, January 30, 2020. URL: https:// www.interpol.int/en/News-and-Events/News/2020/Italy-and-INTERPOL-launch-global-project-to-com- bat-Ndrangheta D. Hall. Inside La Catrina’s Jalisco New Generation Cartel – who hang butchered rivals from bridges & make millions from avocados. The Sun, January 16, 2020. URL: https://www.thesun.co.uk/news/10734265/maria-es- quivel-la-catrina-sicaria-jalisco-new-generation-cartel-cjng-bridges-avocados/ A. Hernandez. Narcoland. The Mexican drug lords and their godfathers. Verso, 2013, 384 pp. URL: https:// www.amazon.com/Narcoland-Mexican-Lords-Their-Godfathers/dp/1781680736 A. Hernandez. El traidor. El diario secreto del hijo del Mayo (The traitor. The secret diary of Mayo’s son). Gri- jalbo, 2020, 384 pp. URL: https://www.amazon.com/traidor-diario-secreto-Traitor-Spanish/dp/1644731509 L. Andrews. Spanish police believe a crackdown on criminal biker gangs in northern Europe could be be- hind a crime wave that saw 24 murders in the Costa del Sol. Daily Mail Online, January 5, 2029. URL: https:// www.dailymail.co.uk/news/article-7852821/Spanish-police-believe-crackdown-criminal-biker-gangs-north- ern-Europe-crime.html I. Davis. Another record breaking year for opium production in US occupied Afghanistan. Waking Times, No- vember 2, 2019. URL: https://www.wakingtimes.com/2017/11/02/another-record-breaking-year-opium-pro- duction-u-s-occupied-afghanistan/?utm_campaign=meetedgar&utm_medium=social&utm_source=meet- edgar.com&fbclid=IwAR3FnYyqwsib06Mnldf6MFf9ocr_iwXL2KYWpuZ2_qq5oc_4vh2iMLhjsfE 4.2. Hate Crimes, Anti-Semitism, Islamophobia, Xenophobia T. Bjørgo, M. Mareš (Eds.). Vigilantism against migrants and minorities. Routledge, 2019, 348 pp. Review by S. Bruszkiewicz in European Eye on Radicalization, February 7, 2020. URL: https://eeradicalization.com/vigilan- tism-against-migrants-and-minorities/ M. Balsamo. Barr says there will be ‘zero tolerance’ on anti-Semitism. The Times of Israel, January 28, 2020. URL: https://www.timesofisrael.com/barr-says-there-will-be-zero-tolerance-on-anti-semitism/ J. Magid. Classroom torched in Palestinian school, in second hate attack in a week. The Times of Israel, January 28, 2020. URL: https://www.timesofisrael.com/classroom-torched-in-palestinian-school-in-second-hate-at- tack-in-a-week/ Germany warns of ‘mass exit’ of Jews if anti-Semitism persists. The Times of Israel, January 26, 2020. URL: https://www.timesofisrael.com/germany-warns-of-mass-exit-of-jews-if-anti-semitism-persists/ France reports 27% increase in anti-Semitic acts. The Times of Israel, January 26, 2020. URL: https://www.time- sofisrael.com/france-reports-27-increase-in-anti-semitic-acts/

ISSN 2334-3745 163 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

A. Rutherford. How to fight racism using science.The Guardian, January 26, 200. URL: https://www.theguard- ian.com/world/2020/jan/26/fight-racism-using-science-race-genetics-bigotry-african-americans-sport-lin- naeus T. Durden. Why laws against hate speech are dangerous. ZeroHedge, January 18, 2020. URL: https://www.zero- hedge.com/political/why-laws-against-hate-speech-are-dangerous A dozen graves are desecrated at a Jewish cemetery in France – the latest in a string of anti-Semitic at- tacks across the country. Daily Mail Online, January 7, 2020. URL: https://www.dailymail.co.uk/news/arti- cle-7860981/A-dozen-graves-desecrated-Jewish-cemetery-France.html L. Kenton. More than 10,000 protesters march from Manhattan to in display of solidarity with the Jewish community amid spate of violent anti-Semitic attacks in New York. Daily Mail Online, January 5, 2020. URL: https://www.dailymail.co.uk/news/article-7854125/Protesters-march-solidarity-Jewish-communi- ty-spate-anti-Semitic-attacks-NY.html M. Oster. NYT calls for mass participation in solidarity march against anti-Semitism. The Times of Israel, January 2, 2020. URL: https://www.timesofisrael.com/nyt-calls-for-mass-participation-in-solidarity-march-against-an- ti-semitism/

5. Extremism, Radicalization L. Schlegel. Pathways, puzzles, processes: the difficulties in defining radicalization.European Eye on radicaliza- tion, January 17, 2020. URL: https://eeradicalization.com/pathways-puzzles-processes-the-difficulties-in-de- fining-radicalization/ T. Abbas. Far right and Islamist radicalization in an age of austerity: a review of sociological trends and impli- cations. The Hague: ICCT, January 13, 2020. URL: https://icct.nl/publication/far-right-and-islamist-radicalisa- tion-in-an-age-of-austerity-a-review-of-sociological-trends-and-implications-for-policy/

5.1. Rightwing Extremism

N. MacFarquhar, A. Goldman. A new face of white supremacy: plots expose danger of ‘the Base’. The New York Times, January 22, 2020. URL: https://www.nytimes.com/2020/01/22/us/white-supremacy-the-base.html I. Kvittingen. Far right groups in Norway instigate more street provocation than before. Sciencenorway, January 29, 2020. URL: https://sciencenorway.no/political-science-politics-violence/far-right-groups-in-norway-insti- gate-more-street-provocation-than-before/1629662 W. Bender. Extremist neo-Nazi leader is a former Villanova student, N.J. resident, reports say. The Philadelphia Inquirer, January 24, 2020. URL: https://www.inquirer.com/news/the-base-neo-nazi-rinaldo-nazzaro-villano- va-delbarton-white-supremacist-20200124.html C. Burack. Germany: over 500 right-wing extremists suspected in Bundeswehr. Deutsche Welle, January 26, 2020. URL: https://www.dw.com/en/germany-over-500-right-wing-extremists-suspected-in-bundes- wehr/a-52152558 D. Phillips. ‘The playbook is the American alt-right’: Bolsonaristas follow familiar extremist tactics. The Guardian, January 27, 2020. URL: https://www.theguardian.com/world/2020/jan/27/american-alt-right-play- book-bolsonaro-extremist-tactics- Who is US neo-Nazi group ‘The Base’?Haaretz, January 17, 2020. URL: https://www.haaretz.com/us-news/ who-is-u-s-neo-nazi-group-the-base-1.8408541

ISSN 2334-3745 164 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

A. Dee. Are far-right extremism and terrorism the same? LinkedIn, January 12, 2020. URL: https://www.linke- din.com/pulse/far-right-extremism-terrorism-same-alok-dee/?trackingId=MppBFsTUza4aPr7PDguLnQ== M. Colborne. Dispatches from Asgardsrei: Ukraine’s annual neo-Nazi music festival. Bellingcat, January 2, 2020. URL: https://www.bellingcat.com/news/2020/01/02/dispatches-from-asgardsrei-ukraines-annual-neo-na- zi-music-festival/ C. van Mersbergen. Duitse burgemeester voelt zich zo bedreigd dat hij een schietwapen wil. De Stentor, January 11, 2020. URL: https://www.destentor.nl/buitenland/duitse-burgemeester-voelt-zich-zo-bedreigd-dat-hij-een- schietwapen-wil~aa94f5b7/ C. Liyanage. Endchan: narratives of the Chanosphere. OpenDemocracy, January 9, 2020. URL: https://www. opendemocracy.net/en/countering-radical-right/endchan-narratives-chanosphere/ E. Weed. The religion of white supremacy in the United States.Rowman & Littlefield, 2017, 176pp. URL: https:// www.radicalisationresearch.org/research/weed-the-religion-of-white-supremacy-in-the-united-states/

5.2. Islamism

Zakir Naik’s preaching and Mahathir’s indifference is turning Malaysia into a hotbed for Islamic radicalization. TFI Post, January 12, 2020. URL: https://tfipost.com/2020/01/zakir-naiks-preaching-and-mahathirs-indiffer- ence-is-turning-malaysia-into-a-hotbed-for-islamic-radicalisation/ S. Hamid. The dilemma of ‘normalization’: can Islamists participate without polarizing politics?Arab Center Washington DC, June 1, 2019. URL: https://www.academia.edu/41615070/Muslim_Brotherhood_and_Salaf- ism_2019_?fbclid=IwAR0U7OHN99e81fdN-VqKsLBaJ5F_4joQhmgcrdr3-ArxodhSb0y32Lzycjo I. Acheson. I warned that terrorism inside jail is a real threat. , January 10, 2020. URL: https://www.telegraph.co.uk/news/2020/01/10/despite-warnings-still-something-rotten-prison-system/ B. Rougier. Les territoires conquis de l’islamisme. 2019. URL: http://www.laicite-republique.org/bernard-rou- gier-les-territoires-conquis-de-l-islamisme-le-point-10-oct-19.html G. Meotti. France, the ‘budding Islamic republic.’ Gatestone Institute, January 10, 2020. URL: https://www.gate- stoneinstitute.org/15412/france-islamic-republic

5.3. Single Issue Extremism

B. Patel. Official document naming Extinction Rebellion as extremist group was sent to government depart- ments, police forces and councils. Daily Mail Online, January 28, 2020. URL: https://www.dailymail.co.uk/news/ article-7939287/Official-document-naming-Extinction-Rebellion-extremist-group-sent-government-depart- ments.html H. Bancroft. Feminist Oxford professor warns ‘democracy is under threat’ after being given security guards at work to protect her from transgender activists. Daily Mail Online, January 26, 2020. URL: https://www. dailymail.co.uk/news/article-7930093/Feminist-Oxford-professor-warns-democracy-threat-given-securi- ty-guards.html Klimaatactivisten Extinction Rebellion die actievoerden op autosalon krijgen elk dagvaarding van 2.000 euro. HLN, January 19, 2020. URL: https://www.hln.be/nieuws/binnenland/klimaatactivisten-extinction-rebel- lion-die-actievoerden-op-autosalon-krijgen-elk-dagvaarding-van-2-000-euro~a1f2e88f/ J. Grierson. Extinction Rebellion listed as ‘key threat’ by counter-terror police. The Guardian, January 19, 2020. URL: https://www.theguardian.com/environment/2020/jan/19/extinction-rebellion-listed-as-key-threat-by- counter-terror-police

ISSN 2334-3745 165 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

M. Sedee. ‘Uit de kast komen’ is nog geen emancipatie. Transgenders. NRC Handelsblad, January 17, 2020. URL: https://www.nrc.nl/nieuws/2020/01/17/uit-de-kast-komen-is-nog-geen-emancipatie-a3987260 - /han- delsblad/2020/01/18/ K. Stevens. Militant vegans storm supermarket and stand in front of the meat section playing sounds of ani- mals being slaughtered … but shoppers completely ignore them. Daily Mail Online, January 14, 2020. URL: https://www.dailymail.co.uk/news/article-7883735/Vegans-play-sounds-slaughterhouse-animal-activist-pro- test-Woolworths-Perth.html C. Duncan. ‘Indefensible’: Priti Patel condemned for backing police over decision to put Extinction Rebellion on terror list. The Independent,January 13, 2020. URL: https://www.independent.co.uk/news/uk/politics/pri- ti-patel-extinction-rebellion-police-extremism-list-counter-terror-prevent-a9281731.html B. Hoffman, J. Ware. Incels: America’s newest domestic terrorism threat. Lawfare, January 12, 2020. URL: https://www.lawfareblog.com/incels-americas-newest-domestic-terrorism-threat?fbclid=IwAR2PONN- 2ne9Eg570RAsH_ldcHnhE5Yl7tnhXGMjiYCN1MwwghVWuYt-vyNc V. Dodd. Ex-prevent chief criticizes terror list’s inclusion of Extinction Rebellion. The Guardian, January 12, 2020. URL: https://www.theguardian.com/uk-news/2020/jan/12/ex-prevent-chief-criticises-terror-lists-inclu- sion-extinction-rebellion-sir-peter-fahy-?CMP=share_btn_tw M. Bertelli. The trans woman who defied her mafia upbringing.Deutsche Welle, January 11, 2020. URL: https:// www.dw.com/en/the-trans-woman-who-defied-her-mafia-upbringing/a-51913360 S. Tanno. Extinction Rebellion is named on official counter-terror police list of extremist organizations along- side Islamist and neo-Nazi groups. Daily Mail Online, January 10, 2020. URL: https://www.dailymail.co.uk/ news/article-7874551/Extinction-Rebellion-named-official-counter-terror-police-list-extremist-organisa- tions.html Shocking moment masked thugs on quad bike chase saboteurs from hunt while screaming abuse at them… seconds after a horseman rode past and gave the chilling warning ‘your worst nightmare’s just turned up.’ Daily Mail Online, January 7, 2020. URL: https://www.dailymail.co.uk/news/article-7860271/Masked-thugs-quad- bike-chase-saboteurs-hunt-screaming-abuse-them.html T. A. Williams. Extinction rebellion descends into bitter infighting over flights as founder compares it to eating meat and accuses celebrity backers of hypocrisy. Daily Mail Online, January 6, 2020. URL: https://www.dai- lymail.co.uk/news/article-7855319/Bitter-flight-ban-dispute-rocks-Extinction-Rebellion-founder-compares- eating-meat.html Boeren melden bedreiging na protestacties:’Boerderijen doelwit sabotage en brandstichting.’ Algemeen Dag- blad, January 4, 2020. URL: https://www.ad.nl/binnenland/boeren-melden-bedreiging-na-protestacties-boer- derijen-doelwit-sabotage-en-brandstichting~a3dd96e6/

6. Counterterrorism Strategies, Tactics and Operations J.H. Elsewood. Counterinsurgency in the Sahel is at risk of unraveling. TerrorismMonitor, 18(3), February 7, 2020. URL: https://jamestown.org/wp-content/uploads/2020/02/TM-Feb.-7-2020-Issue.pdf?x44765 G. Graziosi. Former US drone operator recalls dropping a missile on Afghanistan children and says military is ‘worse than the Nazis’. The Independent, February 8, 2020. URL: https://www.independent.co.uk/news/world/ americas/us-military-drone-nazis-brandon-bryant-a9324011.html?fbclid=IwAR1XBCx7YfGSmC_YydxV- Vji6XKS8-1qB_fuasnH6wNkjSVBhtjUld6i1qc8

ISSN 2334-3745 166 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

T. Tugendhat. Why Britain needs a new law to punish treason. Daily Mail Online, February 9, 2020. URL: https://www.dailymail.co.uk/news/article-7982723/TOM-TUGENDHAT-Britain-needs-new-law-punish- treason.html A. Harpootlian. The slippery slope of the US drone war. Middle East Monitor, February 7, 2020. URL: https:// www.middleeastmonitor.com/20200207-the-slippery-slope-of-the-us-drone-war/ S.J. Frantzman. Fire Weaver: Israel’s super high-tech secret weapon to win the next big war? The National Inter- est, February 8, 2020. URL: https://nationalinterest.org/blog/buzz/fire-weaver-israels-super-high-tech-secret- weapon-win-next-big-war-121746 K. Proctor, D. Sabbagh. UK may bypass human rights convention to rush through terror laws. The Guardian, February 4, 2020. URL: https://www.theguardian.com/uk-news/2020/feb/04/uk-may-bypass-human-rights- convention-to-rush-through-terror-laws?utm_term=Autofeed&CMP=twt_b-gdnnews&utm_medium=So- cial&utm_source=Twitter - Echobox=1580844648 N. Muzee. New British counterterror law on propaganda will backfire.European Eye on radicalization, Febru- ary 4, 2020. URL: https://eeradicalization.com/new-british-counterterror-law-on-propaganda-will-backfire/ M. Ogbonnaya. Has counterterrorism- become a profitable business in Nigeria?Institute for Security Stud- ies, February 4, 2020. URL: https://issafrica.org/iss-today/has-counter-terrorism-become-a-profitable-busi- ness-in-nigeria?fbclid=IwAR37lsHm1VeCC8rvVBDfDXt-1hzmPlUhJj6r37XoVtjowES1_GQPHOW9BPE N. Afzal. For years I questioned government on terrorist releases – Streatham shows it didn’t listen. New States- man, February 3, 2020. URL: https://www.newstatesman.com/politics/uk/2020/02/years-i-questioned-gov- ernment-terrorist-releases-streatham-shows-it-didn-t Morocco’s military said to receive three Israeli reconnaissance drones. The Times of Israel,February 2, 2020. URL: https://www.timesofisrael.com/idf-launches-drill-simulating-multi-front-war/ J. Gross. IDF launches drill simulating multi-front war. The Times of Israel, February 2, 2020. URL: https:// www.timesofisrael.com/idf-launches-drill-simulating-multi-front-war/ L. Gusev. Prospects for the fight against extremism and terrorism in the Central Asian region.Modern Di- plomacy, February 1, 2020. URL: https://moderndiplomacy.eu/2020/02/01/prospects-for-the-fight-against-ex- tremism-and-terrorism-in-the-central-asian-region/ D.L. Byman, I. Saber. Is China prepared for global terrorism? Xinjiang and beyond. Brookings, September 2019. URL: https://www.brookings.edu/research/is-china-prepared-for-global-terrorism/ US military chief in Africa argues for vital US presence. Associated Press, January 30, 2020. URL: https://www. voanews.com/africa/us-military-chief-africa-argues-vital-us-presence US ponders cutting military forces in Africa; allies worry. VOA, January 29, 2020. URL: https://www.voanews. com/africa/us-ponders-cutting-military-forces-africa-allies-worry J. Garamone. Review finds no systemic ethical problems in special ops. Eurasia Review, January 29, 2020. URL: https://www.eurasiareview.com/29012020-review-finds-no-systemic-ethical-problems-in-special-ops/ Y. Jeremy Bob. The future of AI in warfare and counterterrorism.The Jerusalem Post, January 25, 2020. URL: https://www.jpost.com/Jpost-Tech/The-future-of-AI-in-warfare-and-counterterrorism-615112 D. de Luce. Macron pleads with Trump not to cut off US support for French forces in Africa. NBC News, Jan- uary 25, 2020. URL: https://www.nbcnews.com/politics/national-security/macron-pleads-trump-not-cut-u-s- support-french-forces-n1122441?cid=sm_npd_nn_tw_nw J. A. Gross. Bennett okays IDF’s multi-year plan, but funding unclear. The Times of Israel, January 26, 2020. URL: https://www.timesofisrael.com/germany-warns-of-mass-exit-of-jews-if-anti-semitism-persists/

ISSN 2334-3745 167 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

C. Stelzenmüller. The West must reassess its record on foreign intervention.Brookings , January 23, 2020. URL: https://www.brookings.edu/blog/order-from-chaos/2020/01/23/the-west-must-reassess-its-record-on-for- eign-intervention/?fbclid=IwAR2_BkozYBz445I7tvu8gthdZ4iU8xE8_S1Sfh9LA-Ht1EB5kcmhpWXclgU A. Shukla. How Qasem Soleimani’s assassination was an ‘ill-conceived effort to contain Iran’s growing re- gional power.’ The New Arab, January 17, 2020. URL: https://www.alaraby.co.uk/english/indepth/2020/1/17/ author-arshin-adib-moghaddam-talks-more-on-qasem-soleimanis-assassination J. Jordan. Leadership decapitation. Strategic targeting of terrorist organizations. Stanford University Press, 2019. URL: https://newbooksnetwork.com/jenna-jordan-leadership-decapitation-strategic-targeting-of-ter- rorist-organizations-stanford-up-2019/ R. Skidelsky. The Terrorism Paradox.Project Syndicate, January 20, 2020. URL: https://www.project-syndicate. org/commentary/western-terrorism-fear-inversely-proportional-to-risk-by-robert-skidelsky-2020-01 The US war with Iran goes hot. What it means for Iraq and the region. New America, January 7, 2020. URL: https://www.newamerica.org/international-security/events/us-war-iran-goes-hot/ T. Durden. $6.4 trillion and counting 0 how the military-industrial complex hijacked the war on terror. Zero- Hedge, January 19, 2020. IURL: https://www.zerohedge.com/geopolitical/64-trillion-and-counting-how-mili- tary-industrial-complex-hijacked-war-terror J. Frew. New report – In the frame: UK media coverage of drone targeted killing. Drone Wars, January 19, 2020. URL: https://dronewars.net/2020/01/19/intheframe/ - more-11821 D. Sabbagh. Targeted killings via drone becoming ‘normalized’ – report. The Guardian, January 19, 2020. URL: https://www.theguardian.com/politics/2020/jan/19/military-drone-strikes-becoming-normalised-says-report Trump vs. Iran: what now? The Intercept, YouTube, January 14, 2020. URL: https://www.youtube.com/ watch?v=XCkNKYXOJIY S. Jones. Containing Tehran: understanding Iran’s power and exploiting its vulnerabilities. CSIS, January 6, 2020. URL: https://www.csis.org/analysis/containing-tehran-understanding-irans-power-and-exploiting-its-vulner- abilities J. Schwarz. Key architect of 2003 Iraq war is now a key architect of Trump Iran policy. The Intercept, January 16, 2020. URL: https://theintercept.com/2020/01/16/david-wurmser-iran-suleimani-iraq-war/?fbclid=IwAR- 0LYTCE3OGMLXPVyHoze3uc59g1gG7VQxihlnkkjzm8oMj6XRjaI5zAm30 T. Rogoway. Watch DARPA’s air-launched and air-recovered ‘Gremlins’ drone take its first flight.The Drive, Jan- uary 18, 2020. URL: https://www.thedrive.com/the-war-zone/31882/watch-darpas-air-launched-and-air-re- covered-gremlins-drone-take-its-first-flight?fbclid=IwAR0FXeT6W8nFwOFWIYb5lsYZ8cQbf56PcYAjHPc- Dzfk0GYa5Js0wnpASCn8 K. Gilsinan. The war machine is run on contracts.The Atlantic, January 17, 2020. URL: https://www.theatlantic. com/politics/archive/2020/01/us-contractors-and-hidden-costs-us-wars-iran/605068/ S. Simon. The Middle East: Trump blunders in. The New York Review of Books, February 13, 2020. URL: https:// www.nybooks.com/articles/2020/02/13/middle-east-trump-blunders-in/?fbclid=IwAR0tJ4Gn1Esrig2nt- numi8nAGZtv7427bABvOJ29VVzmMr0XRBRNGfCmKoQ E. Goitein. After the IG report: ‘next steps’ for Congress, DOJ, and the FIS court.Just Security, January 13, 2020. URL: https://www.justsecurity.org/68035/after-the-ig-report-next-steps-for-congress-doj-and-the-fisa-court/ E. Lieblich. Targeted killing of general Soleimani: why the laws of war should apply, and why it matters. Just Se- curity, January 13, 2020. URL: https://www.justsecurity.org/68030/targeted-killing-of-general-soleimani-why- the-laws-of-war-should-apply-and-why-it-matters/

ISSN 2334-3745 168 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

A. Callamard. The targeted killing of general Soleimani: its lawfulness and why it matters.Just Security, January 8, 2020. URL: https://www.justsecurity.org/67949/the-targeted-killing-of-general-soleimani-its-lawfulness- and-why-it-matters/ M. Hassan. Reevaluating our counterterrorism information sharing methods. Just Security, January 9, 2020. URL: https://www.justsecurity.org/67962/reevaluating-our-counter-terrorism-information-sharing-methods/ S. Jones. Containing Tehran: understanding Iran’s power and exploiting its vulnerabilities. CSIS, January 6, 2020. URL: https://www.csis.org/analysis/containing-tehran-understanding-irans-power-and-exploiting-its-vulner- abilities H. Kris. Announcing ‘context and consequences of the Soleimani strike’, a new Lawfare E-book. Lawfare, January 10, 2020. URL: https://www.lawfareblog.com/announcing-context-and-consequences-soleima- ni-strike-new-lawfare-e-book S. Attias. The Soleimani killing: Trump’s new approach to the war on terror.BESA Center perspectives Paper #1,399, January 12, 2020. URL: https://besacenter.org/perspectives-papers/soleimani-killing-trump-approach/ M. McGraw. Bush’s Iraq hawks had trump’s back this week. Politico, January 11, 2020. URL: https://www.polit- ico.com/news/2020/01/11/bush-iraq-hawks-trump-097502 M. Amir Rana. Geopolitics and sectarianism. Dawn, January 12, 2020. URL: https://www.dawn.com/ news/1527846/geopolitics-of-sectarianism J.M. Dorsey. Soleimani’s death opens door to alternative security arrangements in the Gulf. BESA Center Per- spectives, #1,400, January 12, 2020. URL: https://besacenter.org/perspectives-papers/soleimani-gulf-security/ ‘You can’t see or hear it’ – Israel reveals details of its new high-energy laser technology. Southfront, January 10, 2020. URL: https://southfront.org/you-cant-see-or-hear-it-israel-reveals-details-of-its-new-high-energy-la- ser-technology/?fbclid=IwAR0ec4ZaB1i9Ih26eaPUKkF4v-RU9xDg-nK9iTu77n50BlMaGMgNCMmstBU S. Sukhankin. The ‘hybrid’ role of Russian mercenaries, PMC’s and irregulars in Moscow’s scramble for Afri- ca. The Jamestown Foundations, January 10, 2020. URL: https://jamestown.org/program/the-hybrid-role-of- russian-mercenaries-pmcs-and-irregulars-in-moscows-scramble-for-africa/?mc_cid=02e1131c28&mc_ei- d=9942bc67e0 Saudi Arabia developing new counter-drone system: SAMI CEO. Al Arabiya, January 9, 2020. URL: https:// english.alarabiya.net/en/News/gulf/2020/01/09/Saudi-Arabia-developing-new-counter-drone-system-SA- MI-CEO.html A. Mitrovica. The war addiction of American cable TV.Al Jazeera, January 9, 2020. URL: https://www.alja- zeera.com/indepth/opinion/war-addiction-american-cable-tv-200109045313718.html C. Carpenter. Assassination, extrajudicial execution, or targeted killing – what’s the difference? Foreign Policy, January 10, 2020. URL: https://foreignpolicy.com/2020/01/10/targeted-killing-assassination-extrajudicial-exe- cution-targeted-killing-illegal-trump-iran-suleimani/ H. Hongju Koh. Is preemptive assassination the new Trump doctrine? Foreign Policy, January 9, 2020. URL: https://foreignpolicy.com/2020/01/09/preemptive-assassination-suleimani-new-trump-doctrine-legal/?utm_ source=PostUp&utm_medium=email&utm_campaign=19196&utm_term=Editor - 39;s Picks OC&?tp- cc=19196 N. Jamali. Why Donald Trump can use the CIA against Iran despite ’s war powers vote in house. Newsweek, January 10, 2020. URL: https://www.newsweek.com/trump-power-military-force-cia-against-iran- pelosi-war-powers-vote-1481373?piano_t=1 M. Blatt. The war in Iraq has shown us what not to do in Iran.The National Interest, January 9, 2020. URL: https://nationalinterest.org/blog/middle-east-watch/war-iraq-has-shown-us-what-not-do-iran-112396 ISSN 2334-3745 169 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

P. Gurski. An end to the war on terrorism. Rowman & Littlefield, 2018, 192p. URL: https://www.amazon.ca/End- War-Terrorism-Phil-Gurski/dp/1786609541/ref=sr_1_5?qid=1574605473&refinements=p_27%3APhil+Gur- ski&s=books&sr=1-5 P. Gurski. Once again, we see that foreign military deployments cause more, not less terrorism. Borealis Threat & Risk Consulting, January 10, 2020. URL: https://borealisthreatandrisk.com/once-again-we-see-that-foreign- military-deployments-cause-more-not-less-terrorism/ S. Shams. After Soleimani killing, Iran’s proxy war to impact Afghanistan and Pakistan.Deutsche Welle, Ja- nuary 7, 2020. URL: https://www.dw.com/en/after-soleimani-killing-irans-proxy-war-to-impact-afghanis- tan-and-pakistan/a-51918670 P. Knoope. Soleiman’s death: can state actors also be terrorists? Clingendael Spectator, January 8, 2020. URL: https://spectator.clingendael.org/en/publication/soleimanis-death-can-state-actors-also-be-terrorists?utm_ source=Newsletter+Clingendael&utm_campaign=cabbe6ee4d-&utm_medium=email&utm_term=0_ec- 8de12e45-cabbe6ee4d-79915549 A. Macias. America has spent $6.4 trillion on wars in the Middle East and Asia since 2001, a new study says. CNBC, November 20, 2020. URL: https://www.cnbc.com/2019/11/20/us-spent-6point4-trillion-on-middle- east-wars-since-2001-study.html C. Murray. Lies, the Bethlehem doctrine, and the illegal murder of Soleimani. Craig Murray, January 4, 2020. URL: https://www.craigmurray.org.uk/archives/2020/01/lies-the-bethlehem-doctrine-and-the-illegal-mur- der-of-soleimani/ Z. Abuza. 2019: a year of lost opportunities in countering militancy. Benar News, December 30, 2019. URL: https:// www.benarnews.org/english/commentaries/asean-security-watch/Abuza-security-2019-12302019125901. html G. Abdul-Ahad. Qassem Suleimani: tears mix with vows of vengeance at funeral march. The Guardian, January 4, 2020. URL: https://www.theguardian.com/world/2020/jan/04/tears-mix-with-vows-of-vengeance-at-sulei- mani-funeral-march-baghdad E. Pilkington. Suleimani killing the latest in a long, grim line of US assassinations efforts. The Guardian, Jan- uary 4, 2020. URL: https://www.theguardian.com/us-news/2020/jan/04/us-political-assassinations-histo- ry-iran-suleimani?CMP=share_btn_tw I. Goldenberg. What a war with Iran would look like. Foreign Affairs, June 4, 2019. URL: https://www.foreig- naffairs.com/articles/iran/2019-06-04/what-war-iran-would-look?utm_medium=social&utm_campaign=tw_ daily_soc&utm_source=twitter_posts Y. Jeremy Bob. US vs. Mossad: assassinations tactics and the death of Soleimani. The Jerusalem Post, January 3, 2020. URL: https://www.jpost.com/Middle-East/Qasem-Soleimani-spectacularly-blown-up-Difference-be- tween-US-vs-Mossad-612980

7. Specific Operations and/or Specific Policy Measures

7.1. Targeted Killing

G. Hahn. Russia, the Eurasian triangle, and the Soleimani assassination. Gordon Hahn, January 2020. URL: https://gordonhahn.com/2020/01/07/russia-the-eurasian-triangle-and-the-soleiman-assassination/amp/ C. Kube, K. Dilanian, C.E. Lee, R. Engel. After Soleimani killing, US braced for Iranian drone and missile strikes. NBC News, January 31, 2020. URL: https://www.nbcnews.com/news/military/after-soleimani-killing-

ISSN 2334-3745 170 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 u-s-braced-iranian-drone-missile-strikes-n1126556 C. Widdershoven. Iran has retaliation options beyond Hormuz in hitting Gulf oil supplies. Al Arabiya, January 16, 2020. URL: https://english.alarabiya.net/en/views/news/middle-east/2020/01/16/Iran-has-retaliation-op- tions-beyond-Hormuz-in-hitting-Gulf-oil-supplies.html K. Almassian. Explained: why the US hated and assassinated Iran’s general Soleimani. 21st Century Wire, Janu- ary 16, 2020. URL: https://21stcenturywire.com/2020/01/16/explained-why-the-us-hated-irans-general-solei- mani/?fbclid=IwAR3S8ztk0gdiCkJ8aMwx4l3ddnPGm5gzD4Vq2HNEkdbC8D4yHgdiTEGoYIE W. Arkin. With a new weapon in Donald Trump’s hands, the Iran crisis risks going nuclear. Newsweek, Janu- ary 13, 2020. URL: https://www.newsweek.com/trump-iran-new-nuclear-weapon-increases-risk-crisis-nucle- ar-1481752 T. O’Connor. Iran pushes ahead with ambitious plans to expel US from region despite Soleiman’s death. Newsweek, January 16, 2020. URL: https://www.newsweek.com/soleimani-death-not-stop-iran-deadly-us- troops-1482176 M. Welch, G. Michalchuk, P. Escobar. Persian peril: the assassination of Qasem Soleimani and the prospect of war with Iran. Global Research, January 15, 2020. URL: https://www.globalresearch.ca/persian-peril-the-assas- sination-of-qasem-soleimani-and-the-prospect-of-war-with-iran/5700626 A. Shukla. How Qasem Soleimani’s assassination was an ‘ill-conceived effort to contain Iran’s growing re- gional power.’ The New Arab, January 17, 2020. URL: https://www.alaraby.co.uk/english/indepth/2020/1/17/ author-arshin-adib-moghaddam-talks-more-on-qasem-soleimanis-assassination J.M. Brodsky. Soleimani’s death creates power vacuum within Iran. The Hill, January 16, 2020. URL: https:// thehill.com/opinion/international/478592-soleimanis-death-creates-power-vacuum-within-iran P. R. Pillar. Trump drives past the Iran de-escalation off-ramp and keeps going. The National Interest, January 12, 2020. URL: https://nationalinterest.org/blog/paul-pillar/trump-drives-past-iran-de-escalation-ramp-and- keeps-going-112976 R. Chesney. Targeting Shahla’I in addition to Soleimani: unpacking the legal questions. Lawfare, January 10, 2020. URL: https://www.lawfareblog.com/targeting-shahlai-addition-soleimani-unpacking-legal-questions M. Chulov. Impact of Suleimani’s death is playing out in unexpected ways. The Guardian, January 12, 2020. URL: https://www.theguardian.com/world/2020/jan/12/impact-of-qassem-suleimanis-death-is-playing-out- in-unexpected-ways-iran Y. Jeremy Bob. Did Israel play a role in the Soleimani assassination? – analysis. The Jerusalem Post, January 12, 2020. URL: https://www.jpost.com/Middle-East/Did-Israel-have-a-role-in-Soleimani-assassination-analy- sis-613937 G. Porter. Pompeo’s Gulf of Tonkin incident. The American Conservative, January 9, 2020. URL: https://www. theamericanconservative.com/articles/pompeos-gulf-of-tonkin-incident/?fbclid=IwAR3_Apb5JldN1EqZBG- bHCWicyKtOLhYahSLMgnmgvQHnAwJINeOvmZWaTec A. Ma. How the Strait of Hormuz, a narrow stretch of water where ships carry $1.2 billion of oil every day, is at the heart of spiraling tensions with Iran. , January 12, 2020. URL: https://www.businessinsider. nl/strait-of-hormuz-explainer-oil-us-iran-tensions-2019-7?international=true&r=US M. Behravesh. Missile diplomacy: how Iran showcased its military capabilities without starting a war. Middle East Eye, January 10, 2020. URL: https://www.middleeasteye.net/news/missile-diplomacy-how-iran-show- cased-its-military-capabilities-without-starting-war R. Zimmt. Spotlight on Iran. December 29, 2019 – January 12, 2020. The Meir Amit Intelligence and Terror- ism Information Center, January 12, 2020. URL: https://www.terrorism-info.org.il/en/spotlight-iran-decem- ISSN 2334-3745 171 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 ber-29-2019-january-12-2020/ C. Pleasance. Iran will take ‘harsher revenge soon’ and had prepared to ‘kill 5,000 Americans’ if US respond- ed to missile strike in Iraq, Tehran’s military commanders claim. Daily Mail Online, January 9, 2020. URL: https://www.dailymail.co.uk/news/article-7868245/Iranian-revolutionary-guards-commander-warns-harsh- er-revenge-soon.html L. Edmonds. White House sent encrypted fax to Iran through the Swiss Embassy in Tehran that warned it not to escalate just hours after Soleimani was killed in an airstrike.Daily Mail Online, January 11, 2020. URL; https://www.dailymail.co.uk/news/article-7875477/White-House-sent-encrypted-fax-Iran-just-hours-Solei- mani-killed-airstrike.html K. Dilanian, C. Kube. Airport informants, overhead drones: how the US killed Soleimani. NBC News, Janu- ary 10, 2020. URL: https://www.nbcnews.com/news/mideast/airport-informants-overhead-drones-how-u-s- killed-soleimani-n1113726 P. Iddon. ‘Operation Martyr Soleimani’: Iran’s missile strike against US in Iraq was more symbolic than le- thal. The New Arab, January 9, 2020. URL: https://www.alaraby.co.uk/english/indepth/2020/1/9/irans-missile- strike-against-us-in-iraq-was-symbolic G. Ali Garewal. Soleimani killing marks climax of US-Iran confrontation. Asia Times, January 8, 2020. URL: https://www.asiatimes.com/2020/01/opinion/soleimani-killing-marks-climax-of-us-iran-confrontation/ Iran missile hits on US military targets in Iraq were precise, satellite images show. Haaretz, January 9, 2020. URL: https://www.haaretz.com/us-news/iran-missiles-on-u-s-military-targets-in-iraq-were-precise-satellite- images-show-1.8375519 F. Pieraccini. The deeper story behind the assassination of Soleimani. Strategic Culture Foundation, Janu- ary 8, 2020. URL: https://www.strategic-culture.org/news/2020/01/08/the-deeper-story-behind-the-assas- sination-of-soleimani/?fbclid=IwAR2vnWmWOdyRKfemhsDthY7BV7KZgnkVpwA4MdkwbZNMI64I- 5aC9fQQs_VY R. Ibbetson. The Ayatollah’s arsenal: a million troops, hundreds of missile launchers capable of striking the entire Middle East and a maritime guerrilla force for choking the world’s oil supply in the Persian Gulf..but is it enough to the stand up to the US? Daily Mail Online, January 8, 2020. URL: https://www.dailymail.co.uk/news/ article-7864273/Khameneis-arsenal-MILLION-troops-hundreds-missile-launchers-navy-choking-oil-supply. html?ito=social-twitter_mailonline P. Cockburn. Iran will make huge political gains from this crisis – as long as it doesn’t overplay its hand. The Independent, January 8, 2020. URL: https://www.independent.co.uk/voices/iran-us-trump-war-missile-attack- qassem-soleimani-death-a9275196.html Qassem Soleimani: timeline of events following Iranian general’s assignation. Deutsche Welle, January 8, 2020. URL: https://www.dw.com/en/qassem-soleimani-timeline-of-events-following-iranian-generals-assassina- tion/a-51910195 https://www.dailymail.co.uk/news/article-7863085/Iran-launches-dozens-precision-guided-ballistic-Fa- teh-110-missiles.html A. Speckhard. Perspective: what are the legal and moral issues and repercussions of the US assassination of Soleimani? Homeland Security Today, January 7, 2020. URL: https://www.hstoday.us/subject-matter-areas/ counterterrorism/perspective-what-are-the-legal-and-moral-issues-and-repercussions-of-the-u-s-assassina- tion-of-soleimani/ M. Kroenig. Soleiman’s death takes America’s ‘maximum pressure’ campaign to next level. Al Arabiya, January 5, 2020. URL: https://english.alarabiya.net/en/views/news/middle-east/2020/01/05/Soleimani-s-death-takes- America-s-maximum-pressure-campaign-to-next-level.html ISSN 2334-3745 172 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

D. Byman. Killing Iran’s Qassem Soleimani changes the game in the Middle East. Vox, January 2, 2020. URL: https://www.vox.com/2020/1/2/21047655/iran-us-strike-general-qassem-soleimani-pentagon-news?fbclid=I- wAR3r-DKn_TKKv9zzEvG1TyVDJ3eVRSBVO5SbwCVKYBNM7gGN2iOQcCJrZl8 L. Edmonds. Iran threatens 35 targets including US warships and Tel Aviv after Soleimani’s death while Hez- bollah issue ultimatum for Iraqi’s to leave US bases by Sunday and the White House says it expects an attack. Daily Mail Online, January 4, 2020. URL: https://www.dailymail.co.uk/news/article-7851623/Iranian-identi- fies-35-targets-retaliatory-strikes-General-Soleimanis-death.html?ito=social-twitter_mailonline I. Chotiner. The meaning of Qassem Suleimani’s death in the Middle East.The New Yorker, January 3, 2020. URL: https://www-newyorker-com.cdn.ampproject.org/c/s/www.newyorker.com/news/q-and-a/the-mean- ing-of-qassem-suleimanis-death-in-the-middle-east/amp P. Scruton, S. Clarke, T. Malone, C. Watson. A visual guide to the US airstrike that killed Qassem Suleima- ni. The Guardian, January 3, 2020. URL: https://www.theguardian.com/world/2020/jan/03/visual-guide-air- strike-that-killed-qassam-suleimani-us-iran P. Bergen. The killing of Iran’s general Soleimani is hugely significant.CNN, January 3, 2020. URL: https:// edition.cnn.com/2020/01/02/opinions/killing-of-irans-general-soleimani-is-hugely-significant-bergen/index. html?fbclid=IwAR0PsYBpn_05haYctrjD9OjS2Eokc5dSfEelQPo1tDhOHXos06uJuLVL8yE Who was Qassem Soleimani Iran’s IRGC’s Quds Force leader? Al Jazeera, January 3, 2020. URL: https://www. aljazeera.com/news/2020/01/qassem-soleimani-iran-elite-quds-force-leader-200103033905377.html R. Fisk. Trump is starting a war with Iran – whether it is by accident or design. The Independent, January 3, 2020. URL: https://www.independent.co.uk/voices/trump-iran-war-us-general-killed-qassem-soleima- ni-attack-a9269161.html?utm_medium=Social&utm_source=Facebook&fbclid=IwAR0xh4gUwwPoQcthY- FAl-qStB9PVB3dQsS0WmagAEDeFs2traECyp-csVuc - Echobox=1578060737 Soleimani assassination –RUSI experts offer initial analysis. RUSI, January 3, 2020. URL: https://rusi.org/ rusi-news/soleimani-assassination-–-rusi-experts-offer-initial-analysis?fbclid=IwAR25qsn2mkYGj8ElqRz- cyMzpC8HyiT5d2sEIDkDIJxkXu_HJWdMPy4eRMp8 Who was Qassem Soleimani, the powerful commander of Iran’s elite Quds force? The New Arab, January 3, 2020. URL: https://www.alaraby.co.uk/english/news/2020/1/3/who-was-iranian-military-commander-qas- sem-soleimani- France, Russia and China condemn slaying of Soleimani as a destabilizing act. The Times of Israel, January 3, 2020. URL: https://www.timesofisrael.com/france-russia-and-china-condemn-slaying-of-soleimani-as-a-de- stabilizing-act/?utm_source=dlvr.it&utm_medium=twitter

7.2. Foreign Fighters and their Families

B.M. Perkins. Security threats and political implications of foreign fighters and prisoners continue to plague Europe. TerrorismMonitor, 18(3), February 7, 2020. URL: https://jamestown.org/program/briefs-321/?mc_ci- d=429f93e420&mc_eid=9942bc67e0 C. Read. Jihadi Jack and other British ISIS fanatics will be tried in Syria next month. Express, February 6, 202. URL: https://www.express.co.uk/news/uk/1239015/isis-news-latest-jihadi-jack-trial-syria-Mohammed-An- war-Miah-Aseel-Muthana Brussels calls for overturning judicial ruling to repatriate 10 ISIS kids. Asharq al-Awsat, February 9, 2020. URL: https://aawsat.com/english/home/article/2121481/brussels-calls-overturning-judicial-ruling-repatri- ate-10-isis-kids?fbclid=IwAR1UR-sbxiu3Ssc4gueJOayd1Kjgm7PhDWPTHlvoCObrYwvf9HGeQkp1zsg

ISSN 2334-3745 173 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

J. Seldin. Support crumbling for plan to try IS foreign fighters in Syria. VOA, February 8, 2020. URL: https:// www.voanews.com/middle-east/support-crumbling-plan-try-foreign-fighters-syria France takes back 17 ISIS children. Asharq al-Awsat, February 3, 2020. URL: https://aawsat.com/english/home/ article/2112686/france-takes-back-17-isis-children G. van Vlierden. The vicious circle of polarization: how the West is creating the next wave of jihadist radicaliza- tion. European Eye on Radicalization, January 24, 2020. URL: https://eeradicalization.com/the-vicious-circle- of-polarization-how-the-west-is-creating-the-next-wave-of-jihadist-radicalization/ A. Zaman. Syrian Kurdish center sets out to defang ‘cubs of the caliphate’. Al Monitor, January 31, 2020. URL: https://www.al-monitor.com/pulse/originals/2020/01/syria-kurdish-center-cubs-caliphate-islamic-state.html E. Sahinkaya, R. Hussein, E. Bilaca. Why is Kosovo taking home Islamic State members? VOA, January 15, 2020. URL: https://www.voanews.com/extremism-watch/why-kosovo-taking-home-islamic-state-members K. Zindulka. French ISIS fighters sentenced to death in Iraq complain of inhuman treatment. Breitbart, Janu- ary 28, 2020. URL: https://www.breitbart.com/europe/2020/01/28/french-isis-fighters-sentenced-death-iraq- complain-inhuman-treatment/ Comment le gouvernement prepare le retour des djihadistes français? LePoint, February 5, 2019. URL: https://www.lepoint.fr/justice/comment-le-gouvernement-prepare-le-retour-des-djihadistes-fran- cais-05-02-2019-2291504_2386.php E. Rosand, B. Heidi Ellis, S. Weine. Minding the gap: how to provide more comprehensive support to the children of ISIS. Brookings, January 28, 2020. URL: https://www.brookings.edu/blog/order-from-chaos/2020/01/28/ minding-the-gap-how-to-provide-more-comprehensive-support-to-the-children-of-isis/ R. Husselbee. Influencing evil. ISIS brides start ‘influencer’ Instagram channels praising jihadis and beg- ging for cash from inside al-Hawl refugee camp. The Sun, January 17, 2020. URL: https://www.thesun.co.uk/ news/10734139/isis-brides-influencer-instagram-jihadis-cash-al-hawl-camp/ A. Speckhard. Ireland’s Lisa Smith is a test run on repatriation of ISIS women. Homeland Security Today, Jan- uary 14, 2020. URL: https://www.hstoday.us/subject-matter-areas/counterterrorism/perspective-irelands-lisa- smith-is-a-test-run-on-repatriation-of-isis-women/ G. Hofstee. The debate around returning foreign fighters in the Netherlands.ISPI, January 9, 2020. URL: https:// www.ispionline.it/en/pubblicazione/debate-around-returning-foreign-fighters-netherlands-24665 Wives of ISIS terrorists burn woman with her kids alive in SDF-run al-Hawl camp. Southfront, January 15, 2020. URL: https://www.cfr.org/blog/top-conflicts-watch-2020-mass-casualty-terrorist-attack-united-states-or- treaty-ally?utm_medium=social_owned&utm_campaign=pps-2020&utm_content=011619&utm_source=f- b&fbclid=IwAR1enN1Zdu4bLC5s9L69NzBiPrXJd6udkdLY14UkHi5r7E_mBDNATdKV J. Aliyev. Turkey deports four German nationals for terror links. Anadolu Agency, January 17, 2020. URL: https://www.aa.com.tr/en/turkey/turkey-deports-4-german-nationals-for-terror-links/1706050 Women, girls and Islamist extremism. A toolkit of intervention practitioners. ISD, 2020. URL: https://www. isdglobal.org/isd-publications/women-girls-and-islamist-extremism/ B. Doherty. Australian mother of five stripped of citizenship, leaving two children potentially stateless. The Guardian, January 17 2020. URL: https://www.theguardian.com/world/2020/jan/18/australian-moth- er-of-five-stripped-of-citizenship-leaving-two-children-potentially-stateless?CMP=share_btn_tw J. Prentis. Man convicted of joining ISIS says he was a spy for Danish intelligence. The National, January 13, 2020. URL: https://www.thenational.ae/world/europe/man-convicted-of-joining-isis-says-he-was-a-spy-for- danish-intelligence-1.963592

ISSN 2334-3745 174 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

7.3. Prosecution: Sentences

F. Thompson, K. Pilling. Radicalized chemistry teacher who tried to join IS freed from jail.MSN , February 8, 2020. URL: https://www.msn.com/en-gb/news/uknews/radicalised-chemistry-teacher-who-tried-to-join-is- freed-from-jail/ar-BBZLwc5 Eight jailed over plot to kill Kosovo President, Prime Minister. RFE/RL, January 22, 2020. URL: https://www. rferl.org/a/eight-jailed-over-plot-to-kill-kosovo-president-prime-minister/30391832.html Egypt sentences 37 to death over deadly, Western Desert insurgency. The New Arab, February 2, 2020. URL: https://www.alaraby.co.uk/english/news/2020/2/2/egypt-sentences-officer-turned-militant-and-36-others-to- death R. Sharp. White supremacist Coast Guard officer who ‘plotted terrorist massacre of Nancy Pelosi, democrats and journalists’ is sentenced to 13 years in prison on gun and drug charges. Daily Mail Online, February 1, 2020. URL: https://www.dailymail.co.uk/news/article-7954179/U-S-Coast-Guard-officer-accused-plotting- attacks-gets-13-years-prison.html?ito=social-twitter_dailymailus French militant recruiter handed long jail term. Asharq al-Awsat, January 25, 2020. URL: https://aawsat.com/ english/home/article/2098801/french-militant-recruiter-handed-long-jail-term C. Hutton. Feds: smuggled Marysville guns were part of Nazi terror plot. Herald Net, January 28, 2020. URL: https://www.heraldnet.com/news/feds-smuggled-marysville-guns-were-part-of-nazi-terror-plot/ D. Jajevic. Bosnian jailed for smuggling gun parts to neo-Nazi –linked clients in Sweden. Deutsche Welle, January 28, 2020. URL: https://www.dw.com/en/bosnian-jailed-for-smuggling-gun-parts-to-neo-nazi-linked- clients-in-sweden/a-52169533 C. Miller. Libya militant who as the ‘eyes and ears’ of 2012 attack ringleader is jailed for 19 years over his part in the fiery assaults which killed four Americans.Daily Mail Online, January 24, 2020. URL: https://www.dailymail.co.uk/news/article-7924121/Libya-militant-eyes-ears-2012-Benghazi-attack-ringlead- er-jailed-19-years.html M. Townsend. Islamists get longer jail terms than far-right extremists. The Guardian, January 18, 2020. URL: https://africacenter.org/spotlight/threat-from-african-militant-islamist-groups-expanding-diversifying/ Tunisia condemns eight to death for presidential guard attack. The New Arab, January 18, 2020. URL: https:// www.alaraby.co.uk/english/news/2020/1/18/tunisia-condemns-8-to-death-for-presidential-guard-attack Y. Jeremy Bob. Terrorist minor involved in murder of Tuvia Weiss gets life in jail. The Jerusalem Post, January 16, 2020. URL: https://www.jpost.com/Arab-Israeli-Conflict/Terrorist-minor-involved-in-murder-of-Tuvia- Weissman-gets-life-in-jail-614361 Urteil des OLG Stuttgart gegen vier Angeklagte u.a. wegen Mitgliedschaft in einer ausländischen terrorsti- schen Verenigung, Kriegsverbrechen und Mord in Syria. Oberlandsgericht Stuttgart, January 13, 2020. URL: https://oberlandesgericht-stuttgart.justiz-bw.de/pb/,Lde/Startseite/Medien/Urteil+des+OLG+Stuttgart+ge- gen+vier+Angeklagte+u_+a_+wegen+Mitgliedschaft+in+einer+auslaendischen+terroristischen+Vereini- gung_+Kriegsverbrechen+und+Mord+in+Syrien/?LISTPAGE=117816 How many people are in prison for terror offences?BBC, January 10, 2020. URL: https://www.bbc.co.uk/news/ amp/uk-50823532 L. Fruen. New York woman, 35, is jailed for 15 years for planning to build bombs for ISIS-inspired attack on funeral of slain NYPD officer attended by Joe Biden. Daily Mail Online, January 10, 2020. URL: https://www. dailymail.co.uk/news/article-7870379/Woman-caught-NYC-terrorism-sting-sentenced-15-years.html

ISSN 2334-3745 175 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

E. Riley. Schoolboy neo-Nazi, 17, who listed ‘areas to attack’ in his home city and wrote in his diary about an ‘inevitable race war’ is jailed for six years and eight months. Daily Mail Online, January 7, 2020. URL: https:// www.dailymail.co.uk/news/article-7860819/Teenage-neo-Nazi-terrorist-16-jailed-six-years-eight-months. html J. Newman. Convicted terrorist, 34, who bragged about being ‘the enemy within’ Britain is sent back to jail after police find his selfie on secret phone.Daily Mail Online, January 3, 2020. URL: https://www.dailymail.co.uk/ news/article-7849457/Terrorist-sent-jail-police-selfie-secret-phone.html

8. Prevention, Preparedness and Resilience Studies C. McGoogan. ‘I was in al-Qaeda, then spied for MI6 – I know deradicalization doesn’t work. Telegraph, Feb- ruary 8, 2020. URL: https://www.telegraph.co.uk/men/thinking-man/al-qaeda-spied-mi6-know-deradicalisa- tion-doesnt-work/ B. Griffiths. Almost 500 terrorists freed from prison in the past decade – with many living back where there were radicalized. The Sun, January 19, 2020. URL: https://www.thesun.co.uk/news/10769942/500-terrorists-re- leased-prison-streets-radicalised/ V. Dodd, J. Grierson. Greenpeace included with neo-Nazis on UK counterterror list. The Guardian, January 17, 2020. URL: https://www.theguardian.com/uk-news/2020/jan/17/greenpeace-included-with-neo-nazis-on-uk- counter-terror-list L. Dearden. Terrorist prisoners free to network and radicalize inmates in British jails. The Independent, January 17, 2020. URL: https://www.independent.co.uk/news/uk/crime/terrorist-prisoners-jails-muslims-hmp-white- moor-attack-isis-security-a9287281.html C. Ariza. Five ways policymakers should combat the radical right in 2020. RANTT Media, January 10, 2020. URL: https://rantt.com/how-to-combat-the-radical-right-2020 G. Clubb. Social movement de-radicalization and the decline of terrorism. Routledge, 2016, 180 pp. URL: https:// www.radicalisationresearch.org/research/clubb-social-movement-de-radicalisation-and-the-decline-of-ter- rorism/ Disengaging from violent extremism. Kickoff for USIP initiative on violent extremist disengagement and rec- onciliation. USIP, January 21, 2020. URL: https://www.usip.org/events/disengaging-violent-extremism A.J. Gielen. Cutting through complexity: evaluating countering violent extremism (CVE). Amsterdam Univer- sity Press, 2020. (dissertation) L. Dearden. Terrorists who ‘self-radicalize’ online are bigger threat than attackers sent by ISIS, counterterror- ism chief says. The Independent, January 6, 2020. URL: https://www.independent.co.uk/news/uk/home-news/ terrorists-radicalise-online-isis-threat-prevent-counter-extremism-attacks-a9257221.html D. Casciani. Top psychologist: no certainty terror offenders can be ‘cured’. BBC, January 2, 2020. URL: https:// www.bbc.com/news/uk-50967100

ISSN 2334-3745 176 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

9. State Repression, Civil War and Clandestine Warfare

9.1. Arbitrary Arrest/Detention/Prison System

161 arrests in Syria in January, most by the regime. Middle East Monitor, February 3, 2020. URL: https://www. middleeastmonitor.com/20200203-161-arrests-in-syria-in-january-most-by-regime/ Egypt arrests 32 women from prominent North Sinai tribe. Middle East Monitor, February 3, 2020. URL: https://www.middleeastmonitor.com/20200203-egypt-arrests-32-women-from-prominent-north-sinai-tribe/ Prominente fordern Menschlichkeit für Julian Assange. RND.de, February 1, 2020. URL: https://www.rnd.de/ politik/prominente-fordern-menschlichkeit-fur-julian-assange-VH4QXBBNMZABTO4UJEO7FFIVMI.html Exclusive interviews with Nils Melzer, Lauri Love and John Keriakou on Assange countdown to freedom. Co- vertAction Magazine, January 31, 2020. URL: https://covertactionmagazine.com/index.php/2020/01/31/exclu- sive-interviews-with-nils-melzer-lauri-love-and-john-kiriakou-on-assange-countdown-to-freedom/ N. Conrad. German report spells out China human rights abuses against Uighur Muslims. Deutsche Welle, Ja- nuary 31, 2020. URL: https://www.dw.com/en/german-report-spells-out-china-human-rights-abuses-against- uighur-muslims/a-52216644 C. Maynes. Former police officers charged with framing Russian journalist.VOA, January 30, 2020. URL: https://www.voanews.com/press-freedom/former-police-officers-charged-framing-russian-journalist B. Quinn. Human rights report to oppose extradition of Julian Assange to US. The Guardian, January 28, 2020. URL: https://www.theguardian.com/media/2020/jan/28/julian-assange-detention-sets-dangerous-prec- edent-for-journalists K. Roth. Howe China threatens human rights worldwide. New York Review of Books, January 14, 2020. URL: https://www.nybooks.com/daily/2020/01/14/how-china-threatens-human-rights-worldwide/ ‘Belgisch-Marokkaanse terrorist al jaren in isoleercel Marokko’. Algemeen Dagblad, January 18, 2020. URL: https://www.ad.nl/buitenland/belgisch-marokkaanse-terrorist-al-jaren-in-isoleercel-marokko~af57a8ac/ D. Coote. American imprisoned in Egypt dies after hunger strike.UPI, January 13, 2020. URL: https://www.upi.com/Top_News/US/2020/01/13/American-imprisoned-in-Egypt-dies-after-hunger- strike/4011578969763/?sl=12 N. Zatat. Stop Uighur internment camps or take the Olympics away from China. The New Arab, January 8, 2020. URL: https://www.alaraby.co.uk/english/indepth/2020/1/8/Stop-Uighur-internment-camps-or-take- Olympics-from-China US: act on China’s ‘crimes against humanity.’ Asia Times, January 9, 2020. URL: https://www.asiatimes. com/2020/01/article/us-urges-action-chinas-on-crimes-against-humanity/ China claims its Muslim ‘concentration camps’ in Xinjiang contribute greatly to the international counter-ter- rorism efforts.Daily Mail Online, January 9, 2020. URL: https://www.dailymail.co.uk/news/article-7869157/ China-claims-Muslim-concentration-camps-contributed-greatly-counter-terrorism-cause.html

9.2. Extra-Judicial Killings, Executions

Atrocity Alert No. 188: Myanmar (Burma), Burkina Faso and Syria. Global Centre for the Responsibility to Pro- tect, January 29, 2020. URL: https://www.globalr2p.org/publications/atrocity-alert-no-188-myanmar-burma- burkina-faso-and-syria/ W. Tucker. Russia’s assassination campaign continues against dissent. In Homeland Security, January 16, 2020. URL: https://inhomelandsecurity.com/russias-assassination-campaign-continues-against-dissent/

ISSN 2334-3745 177 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

D. Brennan. Killing Soleimani was a ‘violation of national and international law’, former Nuremberg war crimes prosecutor says. Newsweek, January 17, 2020. URL: https://www.newsweek.com/killing-qaseem-soleimani-vi- olation-national-international-law-former-nuremberg-war-crimes-prosecutor-1482674 D. Uria. Human rights group: Saudi Arabia executed 184 people in 2019. UPI, January 13, 2020. URL: https:// www.upi.com/Top_News/World-News/2020/01/13/Human-rights-group-Saudi-Arabia-executed-184-peo- ple-in-2019/4661578955381/?mpst=1 Sudan court sentences 15-year-old to death. Middle East Monitor, January 8, 2020. URL: https://www.middlee- astmonitor.com/20200108-sudan-court-sentences-15-year-old-to-death/

9.3. Torture

Tortured American sues Qatar Islamic Bank for financing terror in Syria.Saudi Gazette, January 25, 2020. URL: http://saudigazette.com.sa/article/587597/World/Mena/Tortured-American-sues-Qatar-Islamic-Bank-for-fi- nancing-terror-in-Syria F. Mulraney. CIA psychologist and chief interrogator who waterboarded 9/11 mastermind told the terrorist: ‘I will cut your son’s throat’ if there was another attack on the United States. Daily Mail Online, January 28, 2020. URL: https://www.dailymail.co.uk/news/article-7939221/Psychologist-waterboarded-Twin-Tower-plot- ters-told-mastermind-cut-sons-throat.html S. Pfeiffer, M. Anderson. Architect of CIA’s torture program says it went too far. NPR, January 22, 2020. URL: https://www.npr.org/2020/01/22/798561799/architect-of-cias-torture-program-says-it-went-too- far?sc=18&f=798561799 Second Russian prison guard sentenced in high-profile torture case. RFE/RL, January 17, 2020. URL: https:// www.rferl.org/a/second-russian-prison-guard-sentenced-in-high-profile-torture-case/30383446.html D. Taylor. Government urged to reunite child refugees with families. The Guardian,January 10, 2020. URL: https://www.theguardian.com/world/2020/jan/10/government-urged-to-reunite-child-refugees-with-families A. Buncombe. Wikileaks: UN official accuses UK and US of torture over treatment of Assange and Manning. The Independent, January 1, 2020. URL: https://www.independent.co.uk/news/world/americas/wikileaks-ju- lian-assange-chelsea-manning-torture-un-detention-whistleblower-nils-melzer-a9266076.html?utm_medi- um=Social&utm_source=Twitter&fbclid=IwAR03PocoimRZ8tbd0KmR9cEXHmsT7W_2EAS10jpfTTom- DTX6IKWKQrH4

9.4. Ethnic Cleansing, Genocide, Crimes against Humanity, War Crimes

EU states urge justice in Myanmar at UN Security Council. AFP, February 4, 2020. URL: https://au.news.ya- hoo.com/eu-states-urge-justice-myanmar-un-security-council-225817796--spt.html D. Steinvorth. Eine Uigurin veröffentlicht Dokumente zur Unterdrückung ihres Volkes in Xinjiang –nun steht sie im Fadenkreuz der Weltmacht China. Neue Zürcher Zeitung, February 4, 2020. URL: https://www.nzz.ch/ international/die-china-cables-bringen-diese-uigurin-ins-visier-chinas-ld.1535956 R. Ibrahim. A global catastrophe: ‘260 million Christians experience high levels of persecution.’ Gatestone In- stitute, February 2, 2020. URL: https://www.gatestoneinstitute.org/ A. Salahi. Will we ever know how many people have died in Syria since 2011? The New Arab, January 28, 2020. URL: https://www.alaraby.co.uk/english/indepth/2020/1/28/How-many-people-have-died-in-Syria- since-2011

ISSN 2334-3745 178 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

C.J. Werleman. History will show the warnings of a genocide: why ICJ’s ruling won’t save Rohingya Muslims. The New Arab, January 29, 2020. URL: https://www.alaraby.co.uk/english/indepth/2020/1/29/why-the-icj-rul- ing-wont-save-rohingya-muslims N. Renteria. US bans 13 Salvadoreans over 1989 Jesuit priest killings. Reuters, January 30, 2020. URL: https:// www.reuters.com/article/us-usa-politics-el-salvador/u-s-bans-13-salvadorans-over-1989-jesuit-priest-kill- ings-idUSKBN1ZT03R Het was de hoogste tijd voor excuses aan oorlogsslachtoffers. NRC Handelsblad, January 27, 2020. URL: https:// www.nrc.nl/nieuws/2020/01/27/het-was-de-hoogste-tijd-voor-excuses-aan-oorlogsslachtoffers-a3988358 - / handelsblad/2020/01/28/ B. Funnekotter. Historicus: ‘Overheid dacht met gering kwaad groot kwaad te voorkomen’. NRC Handelsblad, January 27, 2020. URL: https://www.nrc.nl/nieuws/2020/01/27/historicus-overheid-dacht-met-gering-kwaad- groot-kwaad-te-voorkomen-a3988371 - /handelsblad/2020/01/28/ J. Power. World Court gives Myanmar four months to put its house in order – OpEd. Eurasia Review, January 29, 2020. URL: https://www.eurasiareview.com/29012020-world-court-gives-myanmar-four-months-to-put- its-house-in-order-oped/ Rohingya face genocide threat, rules UN top court. Deutsche Welle, January 23, 2020. URL: https://www. dw.com/en/rohingya-face-genocide-threat-rules-un-top-court/a-52117165 Netherlands apologizes for WWII persecution of Jews for first time. Deutsche Welle, January 26, 2020. URL: https://www.dw.com/en/netherlands-apologizes-for-wwii-persecution-of-jews-for-first-time/a-52155867 J. Freedland. ‘Thou shalt not be indifferent’: from Auschwitz’s gate of hell, a last desperate warning. The Guard- ian, January 27, 2020. URL: https://www.theguardian.com/world/2020/jan/27/thou-shalt-not-be-indifferent- from-auschwitzs-gate-of-hell-a-last-desperate-warning Auschwitz 75 years on: Holocaust Day prompts new anti-Semitism warnings. BBC, January 27, 2020. URL: https://www.bbc.com/news/world-europe-51266883 Iran imposes discriminatory forms of discrimination forms for new national ID cards. RFE/RL, January 27, 2020. URL: https://www.rferl.org/a/romanian-ruling-angers-son-of-anti-communist-dissident-killed-in- ceausescu-s-jail/30400758.html Auschwitz survivors warn of rising anti-Semitism 75 years on. Al Jazeera, January 27, 2020. URL: https://www. aljazeera.com/news/2020/01/auschwitz-survivors-warn-rising-anti-semitism-75-years-200127141201322. html The Guardian view on Holocaust Memorial Day: as necessary as ever. The Guardian, January 26, 2020. URL: https://www.theguardian.com/commentisfree/2020/jan/26/the-guardian-view-on-holocaust-memorial-day- as-necessary-as-ever P. Pullella. Pope asks Catholics to say ‘Never Again’ to the Holocaust. Reuters, January 26, 2020. URL: https:// uk.reuters.com/article/uk-holocaust-memorial-auschwitz-pope/pope-asks-catholics-to-say-never-again-to- the-holocaust-idUKKBN1ZP0HB B. Lintner. ICJ ruling Rohingya crisis rights and wrongs. Asia Times, January 24, 2020. URL: https://www.asi- atimes.com/2020/01/article/icj-ruling-shows-rohingya-crisis-rights-and-wrongs/?_=8339792 UN chief welcomes court rebuke of Myanmar. Hurriyet Daily News, January 24, 2020. URL: http://www.hurri- yetdailynews.com/un-chief-welcomes-court-rebuke-of-myanmar-151355 F. Forsyth. Buried for 50 years: Britain’s shameful role in the Biafran war. The Guardian, January 21, 2020. URL: https://www.theguardian.com/commentisfree/2020/jan/21/buried-50-years-britain-shamesful-role-biafran- war-frederick-forsyth ISSN 2334-3745 179 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

O. Holmes. Netanyahu calls for sanctions over ICC war crimes investigation. The Guardian, January 21, 2020. URL: https://www.theguardian.com/world/2020/jan/21/netanyahu-calls-for-sanctions-over-icc-war-crimes-in- vestigation-israel?utm_term=Autofeed&CMP=twt_gu&utm_medium=&utm_source=Twitter - Echo- box=1579620864 C. Verbraak. Selma van de Perre: ‘Ik heb het donkerste in de mens gezien. Maar er waren ook altijd goede mensen.’ NRC Handelsblad, January 16, 2020. URL: https://www.nrc.nl/nieuws/2020/01/16/selma-van-de- perre-ik-heb-het-donkerste-in-de-mens-gezien-maar-er-waren-toch-ook-altijd-goede-mensen-a3987092 - / handelsblad/2020/01/18/ J. Mayo. Auschwitz – the last days of hell: exactly 75 years after its last inmates were freed, the survivors of one of humanity’s most vile atrocities tell their heart wrenching accounts. Daily Mail Online, January 17, 2020.URL: https://www.dailymail.co.uk/news/article-7900713/The-days-hell-Survivors-account-final-hours-Auschwitz- Birkenau.html R. Fahey. The last survivors of Auschwitz: 75 years since they were freed from the Nazi death camp, former prisoners remember the horrors they witnessed as they continue to bear physical and emotional scars. Daily Mail Online, January 14, 2020. URL: https://www.dailymail.co.uk/news/article-7885379/The-survivors-Aus- chwitz-75th-anniversary-Holocaust.html Selma van de Perre (97) doet nu pas haar verhaal over het concentratiekamp. ’Ik gunde het de Duitsers niet dat ik doodging’. Trouw, January 10, 2020. URL: https://www.trouw.nl/binnenland/selma-van-de-perre-97-doet- nu-pas-haar-verhaal-over-het-concentratiekamp-ik-gunde-het-de-duitsers-niet-dat-ik-doodging~b7f660c8/

9.5. State Surveillance

T. Durden. 40 Privacy groups warn that facial recognition is threatening democracy. ZeroHedge, February 2, 2020. URL: https://www.zerohedge.com/technology/40-privacy-groups-warn-facial-recognition-threaten- ing-democracy J. Tapper. Hiding in plain sight: activists don camouflage to beat Met surveillance.The Guardian, Febru- ary 1, 2020. URL: https://www.theguardian.com/world/2020/feb/01/privacy-campaigners-dazzle-camou- flage-met-police-surveillance N. Sharkey. Creepy, Orwellian and un-British: Professor Noel Sharkey says the rash of facial recognition cameras sweeping the UK should worry us all. Daily Mail Online, February 1, 2020. URL: https://www.dai- lymail.co.uk/news/article-7956535/PROFESSOR-NOEL-SHARKEY-says-facial-recognition-cameras-sweep- ing-UK-worry-all.html T. Durden. China’s crackdown on pajama-wearers sparks surveillance state. ZeroHedge, January 31, 2020. URL: https://www.zerohedge.com/geopolitical/chinas-crackdown-pajama-wearers-sparks-surveillance-state-back- lash M. Kwet. The rise of smart camera networks, and why we should ban them.The Intercept, January 27, 2020. URL: https://theintercept.com/2020/01/27/surveillance-cctv-smart-camera-networks/ T. Durden. Chicago police are using a facial recognition program that scans billions of Facebook photos. Ze- roHedge, January 30, 2020. URL: https://www.zerohedge.com/technology/chicago-police-are-using-facial-rec- ognition-program-scans-billions-facebook-photos R. Marsden. Clearview: the app that helps strangers find your name and personal info from a single photo. The National, January 28, 2020. URL: https://www.thenational.ae/arts-culture/clearview-the-app-that-helps- strangers-find-your-name-and-personal-info-from-a-single-photo-1.970404 Cities of tomorrow: safety, smarts, and surveillance. CSIS, January 23, 2020. URL: https://www.csis.org/events/ cities-tomorrow-safety-smarts-and-surveillance

ISSN 2334-3745 180 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

T. Durden. The ugly truth about how much Americans have been spied on by the government since 2001. ZeroHedge, January 19, 2020. URL: https://www.zerohedge.com/political/ugly-truth-about-how-much-ameri- cans-have-been-spied-govt-2001 C. Osborne. EU considers banning facial recognition technology in public spaces. ZDNet, January 17, 2020. URL: https://www.zdnet.com/article/eu-considers-banning-facial-recognition-technology-in-public-spaces/

10. Intelligence Operations M. Ehret. Consortium news strike back: London’s Five Eyes & Freeland’s Nazi roots stands exposed once more. Strategic Culture, January 29, 2020. URL: https://www.strategic-culture.org/news/2020/01/29/consor- tium-news-strikes-back--five-eyes-freelands-nazi-roots-stand-exposed-once-more/?fbclid=IwAR- 1Gy5Qr0huTKtASKQ1TgbasuwPfCu8Tew3FRlHn3MELMqGaaUk6gYRBLs0 S. Couthhart, M. Landon-Murray, D. van Puyvelde (Eds.) Researching National Security Intelligence. George- town University Press, November 2019, 272p. URL: http://press.georgetown.edu/book/georgetown/research- ing-national-security-intelligence - body R. D. Steele. Reinventing intelligence. 30 years in the wilderness. Independently Published, 2019, 504 pp. URL: https://www.amazon.com/REINVENTING-INTELLIGENCE-Wilderness-Reinventing-America/ dp/1675643164 Jill Sanborn named Assistant Director of the Counterterrorism Division. FBI, January 8, 2020. URL: https:// www.fbi.gov/news/pressrel/press-releases/jill-sanborn-named-assistant-director-of-the-counterterrorism-di- vision?utm_campaign=email-Immediate&utm_medium=email&utm_source=national-press-releases&utm_ content=%5B778452%5D-%2Fnews%2Fpressrel%2Fpress-re S. Sukhankin. Continuation of policy by other means: Russian private military contractors in the Libyan civ- il war. TerrorismMonitor, 18(3), February 7, 2020. URL: https://jamestown.org/wp-content/uploads/2020/02/ TM-Feb.-7-2020-Issue.pdf?x44765 R.G. Kaiser. Fear and loathing and the FBI. The New York Review of Books, February 27, 2020. URL: https:// www.nybooks.com/articles/2020/02/27/fear-loathing-fbi/?fbclid=IwAR0Lo9v5aCMc5b4OermnxAcbrmIaB- nbk3NhiH9S9l6eLi19CwiCcnlYiO_A N. Bertrand, D. Lippman. Spies fear a consulting firm helped hobble US intelligence. Politico, February 7, 2020. URL: https://www.politico.com/story/2019/07/02/spies-intelligence-community-mckinsey-1390863 J. Menn, J. Stubbs. FBI probes use of Israeli firm’s spyware in personal and government hacks – sources. Reuters, February 4, 2020. URL: https://mobile.reuters.com/article/amp/idUSKBN1ZT38B?__twitter_impression=true R. Lovelace. Director of US counterintelligence: ‘We had a horrible year’. The Washington Times, February 4, 2020. URL: https://www.washingtontimes.com/news/2020/feb/4/director-us-counterintelligence-we-had-hor- rible-ye/?utm_campaign=shareaholic&utm_medium=twitter&utm_source=socialnetwork M. Kennedy. Ex-CIA employee accused of leaking documents to Wikileaks goes on trial. NPR, February 3, 2020. URL: https://www.npr.org/2020/02/03/802269834/ex-cia-employee-accused-of-leaking-documents-to- wikileaks-goes-on-trial?utm_medium=twitter&utm_campaign=news&utm_source=dlvr.it Ex-Israel army chief admits arming Syria opposition. Middle East Monitor, February 3, 2020. URL: https:// www.middleeastmonitor.com/20200203-ex-israel-army-chief-admits-arming-syria-opposition/ D. Bechev. Russia’s spy war in the Balkans. Al Jazeera, February 3, 2020. URL: https://www.aljazeera.com/ indepth/opinion/russia-spy-war-balkans-200203083400861.html?fbclid=IwAR0s7a5SCyReK9LpvgI3OJzxE- cLyFTFQsSmHYVlocrhYoA9Xxq-mqce2LYg

ISSN 2334-3745 181 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

P. Miller Keenie Minie: the British mercenaries who got away with war crimes. Plutobooks, 2020. URL: https:// www.whsmith.co.uk/products/keenie-meenie-the-british-mercenaries-who-got-away-with-war-crimes/ phil-miller/paperback/9780745340791.html FBI probes use of Israeli firm’s spyware in personal and government hacks.The New Arab, January 31, 2020. URL: https://www.alaraby.co.uk/english/news/2020/1/31/fbi-probing-use-of-israeli-spyware-in-us-hacks T. Leahy. The intelligence war against the IRA.Cambridge University Press, 2020. URL: https://www.cambridge. org/core/books/intelligence-war-against-the-ira/A34D7CEFB3118C4C2F9553F4D30D91ED Turkish media blame CIA agent for recent unrest in Iran. The Iran project, January 8, 2018. URL: https://thei- ranproject.com/blog/2018/01/08/turkish-media-blame-cia-agent-recent-unrests-iran/ D. Hayes. Calm before the storm. Q Chronicles, Book 1. DHayes Media, 2020, 356 pp. URL: https://www.amazon. com/gp/product/B0849KFDRP/ref=as_li_qf_asin_il_tl?ie=UTF8&tag=praymedi-20&creative=9325&link- Code=as2&creativeASIN=B0849KFDRP&linkId=abee5798ac31bde17fb7216e5a931249 How Russian agents hunt down Kremlin opponents. Putin’s killers in Europe. Der Spiegel Online, December 9, 2019. URL: https://www.spiegel.de/international/world/how-russian-agents-hunt-down-kremlin-opponents- in-europe-a-1300091.html UN expert: Saudi crown prince behind hack on Amazon CEO. Middle East Monitor, January 24, 2020. URL: https://www.middleeastmonitor.com/20200124-un-expert-saudi-crown-prince-behind-hack-on-amazon- ceo/ V. Edwards. Saudi social media influencer, 27, who criticized Crown Prince Mohammed bin Salman says the regime tried to kidnap him on US soil but he was saved by the FBI. Daily Mail Online, January 24, 2020. URL: https://www.dailymail.co.uk/news/article-7923841/Social-media-influencer-criticized-Mohammed-bin-Sal- man-says-regime-tried-kidnap-US.html J. Wood. Saudi Arabia planned to spy on murdered journalist Jamal Khashoggi’s fiancée when she was in Brit- ain after his death, US spy chief warned.Daily Mail Online, January 24, 2020. URL: https://www.dailymail. co.uk/news/article-7925925/Saudi-Arabia-planned-spy-murdered-journalist-Jamal-Khashoggis-fiancee-Brit- ain.html Armenia’s ex-security service chief found dead with gunshot wound. RFE/RL, January 17, 2020. URL: https:// www.rferl.org/a/armenia-s-ex-security-service-chief-found-dead-with-gunshot-wound/30383040.html M. Bentham. MI5 to hire behavioral scientists as it seeks new ways to combat terrorists. Evening Standard, Jan- uary 13, 2020. URL: https://www.standard.co.uk/news/crime/mi5-to-hire-behavioural-scientists-as-it-seeks- new-ways-to-combat-terrorists-a4332971.html A. Reich, Y. Jeremy Bob, Israeli intel helped the US assassinate Soleimani – report. The Jerusalem Post, Janu- ary 12, 2020. URL: https://www.jpost.com/Middle-East/Israeli-intel-helped-the-US-assassinate-Soleimani-re- port-613899

11. Cyber Operations

11.1. General

UK’s booming cyber security sector worth £8.3 billion. Gov.uk, January 30, 2020. URL: https://www.gov.uk/ government/news/uks-booming-cyber-security-sector-worth-83-billion

ISSN 2334-3745 182 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

D. Clark. Cybersecurity strategy: the business risk of being caught unprepared. Forbes, January 31, 2020. URL: https://www.forbes.com/sites/forbeshumanresourcescouncil/2020/01/31/cybersecurity-strategy-the-busi- ness-risk-of-being-caught-unprepared/ - 554b3cd71f41 A. Court. Mark Zuckerberg declares Facebook is going to ‘stand up for free expression’ and allow people to post what they want – but the CEO admits the new move will ‘p**s off a lot of people.’ Daily Mail Online, February 1, 2020. URL: https://www.dailymail.co.uk/news/article-7955589/Mark-Zuckerberg-declares-Facebook-go- ing-stand-free-expression.html I. Kohen. Five cyber risks that will define 2020.Help Net Security, January 6, 2020. URL: https://www.helpnetse- curity.com/2020/01/06/cyber-risks-2020/?ct=t(EMAIL_CAMPAIGN_9_23_2019_12_8_COPY_02) L. Fruen. Facebook names director of its $130 million ‘Supreme Court’ oversight board as human rights advo- cate Thomas Hughes – and even CEO Mark Zuckerberg won’t be able to overrule him.Daily Mail Online, Jan- uary 29, 2020. URL: https://www.dailymail.co.uk/news/article-7940865/Facebook-names-director-Supreme- Court-Zuckerberg-wont-able-overrule-him.html T. Durden. ‘Surveillance capitalism’: a summary of critics. ZeroHedge, January 27, 2020. URL: https://www. zerohedge.com/technology/surveillance-capitalism-summary-critics Outdated laws put UK’s cybersecurity at risk: report. Hurriyet Daily News, January 23, 2020. URL: http://www. hurriyetdailynews.com/outdated-laws-put-uks-cybersecurity-at-risk-report-151317 J. Hakmeh, A. Peters. A new UN cybercrime treaty? The way forward for supporters of an open, free, and secure Internet. Council on Foreign relations, January 13, 2020. URL: https://www.cfr.org/blog/new-un-cyber- crime-treaty-way-forward-supporters-open-free-and-secure-internet?utm_medium=social_owned&utm_ content=011520&utm_source=fb&fbclid=IwAR3kABEXAnj6b2Aj8NGTAR89yd3a7Yd8vh1mG9RtlGMrTy- iMHZIIJ4Zpbms G. David Maayan. The IoT rundown for 2020: stats, risks and solutions. Security Today, January 13, 2020. URL: https://securitytoday.com/articles/2020/01/13/the-iot-rundown-for-2020.aspx Firefox attacks: Homeland Security urges all users to update browsers immediately in rare warning. Fact- Company, January 10, 2020. URL: https://www.fastcompany.com/90450626/firefox-attacks-homeland-secu- rity-urges-mac-users-to-update-browsers-immediately-in-rare-warning?fbclid=IwAR3onciRvCWjl8hGbB- Zm1sV6Y7SmB5FHh1qWMCsZAxsI0UF7cduw623V7qY EU unveils new consumer protection rules for digital economy. Deutsche Welle, January 8, 2020. URL: https:// www.dw.com/en/eu-unveils-new-consumer-protection-rules-for-digital-economy/a-51923339 Forcepoint’s cybersecurity predictions for 2020. AME Info, January 5, 2020. URL: https://www.ameinfo.com/ industry/technology/forcepoints-cybersecurity-predictions-for-2020

11.2. Cyber Crime

P. Howell O’Neill. A dark web tycoon pleads guilty. But how was he caught? MIT Technology Review, February 8, 2020. URL: https://www.technologyreview.com/s/615163/a-dark-web-tycoon-pleads-guilty-but-how-was- he-caught/ Which vulnerabilities were most exploited by cybercriminals in 2019? Helpnetsecurity, February 6, 2020. URL: https://www.helpnetsecurity.com/2020/02/06/most-exploited-vulnerabilities-2019/ B. Chapman. Could a cyberattack cause the next financial crisis?The Independent, February 8, 2020. URL: https:// www.independent.co.uk/independentpremium/news-analysis/cyberattack-next-financial-crisis-cause-chris- tine-lagare-ecb-a9322466.html

ISSN 2334-3745 183 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

D. Palmer. These are the top ten software flaws used by crooks: make sure you’ve applied the patches.ZDNet , February 4, 2020. URL: https://www.zdnet.com/article/these-are-the-top-ten-software-flaws-used-by-crooks- make-sure-youve-applied-the-patches/ M. Kolbasuk McGee. Hackers pose increasing risk to medical research data. Inforisk Today, February 4, 2020. URL: https://www.inforisktoday.com/hackers-pose-increasing-risk-to-medical-research-data-a-13686?utm_ source=dlvr.it&utm_medium=twitter A. Cuthbertson. Hackers use coronavirus to spread computer virus. The Independent, February 3, 2020. URL: https://www.independent.co.uk/life-style/gadgets-and-tech/news/coronavirus-china-computer-vi- rus-face-mask-malware-emotet-a9314761.html Z. Zorz. UN hacked: attackers got in via SharePoint vulnerability. HelpNetSecurity, January 30, 3030. URL: https://www.helpnetsecurity.com/2020/01/30/un-hacked/ 2019 saw more data breaches, fewer sensitive records exposed. HelpNetSecurity, January 29, 2020. URL: https:// www.helpnetsecurity.com/2020/01/29/more-breaches-fewer-records-exposed/ UN says offices in Geneva, Vienna targeted by ‘well-resourced’ cyberattack last year. Reuters, January 29, 2020. URL: https://www.reuters.com/article/us-un-cyber/u-n-says-offices-in-geneva-vienna-targeted-by-well-re- sourced-cyberattack-last-year-idUSKBN1ZS2V7 Leaked report shows United Nations suffered hack. Associated Press, January 29, 2020. URL: https://www.voan- ews.com/silicon-valley-technology/leaked-report-shows-united-nations-suffered-hack J. Wierenga. Dit zijn de online risico’s die bedrijven bedreigen in 2020. Emerce, January 16, 2020. URL: https:// www.emerce.nl/achtergrond/dit-zijn-de-online-risicos-in-2020 C. Cimpanu. Hacker leaks passwords for more than 500,000 servers routers , and IoT devices. ZDNet, January 19, 2020. URL: https://www.zdnet.com/article/hacker-leaks-passwords-for-more-than-500000-servers-rout- ers-and-iot-devices/ - ftag=RSSbaffb68 C. Cimpanu. VISA’s plan against Magecart attacks: devalue and disrupt. ZDNet, Jnauary 17, 2020. URL: https:// www.zdnet.com/article/visas-plan-against-magecart-attacks-devalue-and-disrupt/ M. Wilczek. Cybercrime: AI’s growing threat. Cybersecurity incidents expected to rise by nearly 70% and cost $5 trillion annually by 2024. DarkReading, October 4, 2019. URL: https://www.darkreading.com/risk/cyber- crime-ais-growing-threat-/a/d-id/1335924 C. Osborne. WordPress plugin vulnerability can be exploited for total website takeover. ZDNet, January 17, 2020. URL: https://www.zdnet.com/article/wordpress-plugin-vulnerability-can-be-exploited-for-full-web- site-hijacking/ C. Osborne. JhoneRAT exploits cloud services to attack Middle Eastern countries. ZDNet, January 17, 2020. URL: https://www.zdnet.com/article/jhonerat-exploits-microsoft-office-cloud-services-to-attack-mid- dle-eastern-countries/ M. Fitzmaurice. Cybercrime investigation into site with ’12 billion personal credentials’ results in NI arrest. Belfast Live, January 17, 2020. URL: https://www.belfastlive.co.uk/news/belfast-news/cybercrime-investiga- tion-site-12-billion-17586005 C. Cimpanu. FBI seizes WeLeakInfo, a website that sold access to breached data. ZDNet, January 17, 2020. URL: https://www.zdnet.com/article/fbi-seizes-weleakinfo-a-website-that-sold-access-breached-data/ C. Cimpanu. A hacker is patching Citrix servers to maintain exclusive access. ZDNet, January 17, 2020. URL: https://www.zdnet.com/article/a-hacker-is-patching-citrix-servers-to-maintain-exclusive-access/?ftag=- COS-05-10aaa0g&taid=5e21ebc1faedb900013a4571&utm_campaign=trueAnthem%3A+Trending+Con- tent&utm_medium=trueAnthem&utm_source=twitter ISSN 2334-3745 184 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

C. Cimpanu. FBI: nation-state actors have breached two US municipalities. ZDNet, January 16, 2020. URL: https://www.zdnet.com/article/fbi-nation-state-actors-have-breached-two-us-municipalities/ E. Tucker. AP explains: not all cyber threats equally worrisome. Associated Press, January 10, 2020. URL: https:// apnews.com/4f361091dc8f047b502f006326621135 INTERPOL-led action takes aim at cryptojacking in Southeast Asia. Eurasia Review, January 10, 2020. URL: https://www.eurasiareview.com/10012020-interpol-led-action-takes-aim-at-cryptojacking-in-southeast-asia/ T. Seals. DeathRansom campaign linked to malware cornucopia. Threatpost, January 6, 2020. URL: https:// threatpost.com/deathransom-campaign-malware-cornucopia/151567/ T. Durden. Almost $300 million stolen from crypto-exchanges in 2019. ZeroHedge, January 6, 2020. URL: https://www.zerohedge.com/crypto/almost-300-million-stolen-crypto-exchanges-2019 T. Durden. ‘Iranian hackers’ take down US government site after DHS warns of lone wolf terrorists, cyberat- tacks. ZeroHedge, January 5, 2020. URL: https://www.zerohedge.com/geopolitical/iranian-hackers-take-down- us-government-site-after-dhs-warns-lone-wolf-terrorists US government agency website hacked by group claiming to be from Iran. The Guardian, January 5, 2020. URL: https://www.theguardian.com/world/2020/jan/05/us-government-agency-website-hacked-by-group- claiming-to-be-from-iran?utm_term=Autofeed&CMP=twt_b-gdnnews&utm_medium=Social&utm_ source=Twitter - Echobox=1578197616

11.3. Cyber Warfare & Espionage

US cyber command hacked ISIS. Cyber Security Intelligence, January 24, 2020. URL: https://www.cybersecu- rityintelligence.com/blog/us-cyber-command-hacked-isis--4751.html Cyberattacks targeted world leaders’ planes as they flew into Israel last week.The Times of Israel, January 26, 2020. URL: https://www.timesofisrael.com/world-leaders-planes-faced-cyberattacks-as-they-landed-in-isra- el-last-week/ K. Cook Zacks. Cyber warfare: the coming battleground of AI machines. Yahoo, January 9, 2020. URL: https:// finance.yahoo.com/news/cyber-warfare-coming-battleground-ai-170405752.html C. Bronk. The cyber consequences of killing Qassim Suleinmani. Forbes, January 3, 2020. URL: https://www. forbes.com/sites/uhenergy/2020/01/03/the-cyber-consequences-of-killing-qassim-suleimani/ - 4df7b3765930 H. Lin. On the integration of psychological operations with cyber operations. Lawfare, January 9, 2020. URL: https://www.lawfareblog.com/integration-psychological-operations-cyber-operations US issues alert warning of potential cyberattacks. RFE/RL, January 5, 2020. URL: https://www.rferl.org/a/ homeland-security-warns-iranian-cyberattack-following-drone-strike/30360761.html A. Mellen. Is cyber retaliation from Iran imminent? Cyberreason, January 3, 2020. URL: https://www.cyberea- son.com/blog/is-cyber-retaliation-from-iran-imminent F. Bajak. Iranian cyberattacks on US feared after Soleimani killing.The Times of Israel, January 4, 2020. URL: https://www.timesofisrael.com/iranian-cyberattacks-on-us-feared-after-soleimani-killing/ Iran ‘revenge’ could come in the form of cyber-attacks, experts warn. The Guardian, January 4, 2020. URL: https://www.theguardian.com/world/2020/jan/03/iran-cyberattacks-experts-us-suleimani C. Timberg, T. Romm, I. Stanley-Becker. ‘A cyber attack should be expected’: US strike on Iranian leader sparks fears of major digital disruption. Seattle Times, January 3, 2020. URL: https://www.seattletimes.com/ nation-world/a-cyber-attack-should-be-expected-u-s-strike-on-iranian-leader-sparks-fears-of-major-digital- disruption/ ISSN 2334-3745 185 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

11.4. Internet Regulation/Censorship/Removal of Harmful Content/Blackout

Facebook says removed account of gunman in Thai shooting. Reuters, February 8, 2020. URL: https://www.re- uters.com/article/us-thailand-shooting-facebook/facebook-says-removed-account-of-gunman-in-thai-shoot- ing-idUSKBN2020JB M. Rasch. When online forums become terrorist networks, how do we deal with them? Marketplace, August 6, 2019. URL: https://www.marketplace.org/shows/marketplace-tech/online-terrorist-forums-8chan-el-paso- mass-shooting/ D. Neal. China tightens its Internet controls. The Inquirer, May 5, 2011. URL: https://www.theinquirer.net/ inquirer/news/2068146/china-tightens-internet-controls Michigan governor urges broader Facebook crackdown on hate speech, citing attacks on state’s lawmakers. Reuters, January 18, 2020. URL: https://www.reuters.com/article/us-facebook-content-michigan/michigan- governor-urges-broader-facebook-crackdown-on-hate-speech-citing-attacks-on-states-lawmakers-idUSKB- N1ZG2KQ M. Jaffe-Hoffman. Twitter suspends terror victim’s page: photo of wounds ‘gratuitous gore.’ The Jerusalem Post, January 7, 2020. URL: https://www.jpost.com/Arab-Israeli-Conflict/Twitter-suspends-terror-victims-page- Photo-of-wounds-gratuitous-gore-613439 D. O’Sullivan, A. Moshtaghian. Instagram says it’s removing posts supporting Soleimani to comply with US sanc- tions. CNN, January 11, 2020. URL: https://edition.cnn.com/2020/01/10/tech/instagram-iran-soleimani-posts/ index.html?utm_term=link&utm_medium=social&utm_content=2020-01-11T01%3A24%3A02&utm_ source=twCNNi C. Mills Rodrigo. Facebook bans deepfake videos. The Hill, January 7, 2020. URL: https://thehill.com/policy/ technology/477078-facebook-bans-deepfake-videos H. Keinon. Antisemitism: draining the social media swamp. The Jerusalem Post, January 3, 2020. URL: https:// www.jpost.com/Diaspora/Antisemitism/Antisemitism-draining-the-social-media-swamp-612949

11.5. Strategic Communication/Information Warfare/Influence Operations

Cyborgs, trolls and bots: a guide to online misinformation. Associated Press, February 8, 2020. URL: https:// www.voanews.com/silicon-valley-technology/cyborgs-trolls-and-bots-guide-online-misinformation K.M. Batarfi. The media war!Saudi Gazette, February 4, 2020. URL: http://saudigazette.com.sa/article/588157/ Opinion/OP-ED/The-media-war! C. Johnstone. The keystone issue is narrative management. OpEdNews, February 2, 2020. URL: https://www. opednews.com/articles/The-Keystone-Issue-is-Narr-by-Caitlin-Johnstone-Corporate-Media_Media_Me- dia-Distortion_Media-News-200202-503.html S. Cook. From Coronavirus to the Hong Kong protests: how China’s leaders manipulate news globally. Amer- ican Thought Leaders, the Epoch Times, February 2, 2020. URL: https://www.youtube.com/watch?v=YGPQY- fz3BlA EU: Russia, China use ‘digital war’ to undermine democracies. Associated Press, January 30, 2020. URL: https:// www.voanews.com/europe/eu-russia-china-use-digital-war-undermine-democracies S. Cook. Bejing’s global megaphone: the expansion of Chinese Communist Party media influence since 2017. Freedom House, 2019. URL: https://freedomhouse.org/report/special-reports/beijings-global-megaphone-chi- na-communist-party-media-influence-abroad?fbclid=IwAR3udw37wMDbBeJ_FT-O0M6mkYHswF- 8s3HHnqG_0Y9wAHL1U01q3nftPqUs

ISSN 2334-3745 186 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

M. Owen Jones. Saudi Arabia’s bot army flourishes as twitter fails to tame the beast. Middle East Eye, Janu- ary 20, 2020. URL: https://www.middleeasteye.net/opinion/despite-twitter-culls-riyadhs-disinformation-net- work-still-going-strong N. Nyabola. Cambridge Analytica and the end of elections. Al Jazeera, January 18, 2020. URL: https://www. aljazeera.com/indepth/opinion/cambridge-analytica-elections-200112201424047.html Facebook information warfare: inside Iran’s shadowy operations to target you on social media. War is Boring, January 10, 2020. URL: https://warisboring.com/facebook-information-warfare-inside-irans-shadowy-opera- tions-to-target-you-on-social-media/ C. Laurens. How to spot a deep fake. World Economic Forum, January 10, 2020. URL: https://www.weforum. org/agenda/2020/01/how-to-spot-a-deepfake/ E. Crane. Senior Facebook executive claims Cambridge Analytica scandal was a ‘non-event’, admits Russians did manipulate the election and brands criticism of the site fake news in secret post. Daily Mail Online, January 8, 2020. URL: https://www.dailymail.co.uk/news/article-7862625/Facebook-executive-claims-Cambridge-An- alytica-scandal-non-event.html C. Cadwalladr. Fresh Cambridge Analytica leak ‘shows global manipulation is out of control.’ The Guardian, Jan- uary 4, 2020. URL: https://www.theguardian.com/uk-news/2020/jan/04/cambridge-analytica-data-leak-glob- al-election-manipulation?CMP=Share_AndroidApp_Twitter

12. Risk and Threat Assessments, Forecasts and Analytic Studies

12.1. Analytical Studies

D. K. Gupta. Understanding terrorism and political violence. The life cycle of birth, growth, transformation, and demise. (2nd Edition) 2020. F. Prager, G. Martin. Terrorism: an International Perspective. Sage Publishing, 2020, 800 pp. URL: https://www. radicalisationresearch.org/research/martin-terrorism-an-international-perspective/

12.2. Terrorism Databases

A new era of conflict and violence.UN75 Shaping our future together, 2020. URL: https://www.un.org/sites/ un2.un.org/files/un75_conflict_violence.pdf Global Terrorism Index 2019. Measuring the impact of terrorism. Institute for Economic and Peace, November 2019. URL: http://visionofhumanity.org/app/uploads/2019/11/GTI-2019web.pdf Pakistan Security Report 2019. PIPS, January 5, 2020. URL: https://www.pakpips.com/article/book/paki- stan-security-report-2019 M. Amir Rana. The ongoing challenge.Dawn, December 29, 2019. URL: https://www.dawn.com/news/1524992/ the-ongoing-challenge P. Gurski. Deaths from terrorism are down, but… Borealis Threat & Risk Consulting,December 18, 2019. URL: https://borealisthreatandrisk.com/deaths-from-terrorism-are-down-but/ B.N. Nezhvetskaya, J.S. Tan. What we learned from over a decade of tech activism. The Guardian, December 23, 2019. URL: https://www.theguardian.com/commentisfree/2019/dec/22/tech-worker-activism-2019-what- we-learned

ISSN 2334-3745 187 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

J. Aasland Ravdal, S. Lygren, L.W. Hagen A. Revik Jupakas. RTV Trend Report 2019. Right wing terrorism and violence in Western Europe 1990-2018. C-REX, December 2019. URL: https://www.sv.uio.no/c-rex/english/ topics/online-resources/rtv-dataset/index.html K. Sale. Political collapse: the center cannot hold. Counterpunch, December 9, 2019. URL: https://www.coun- terpunch.org/2019/12/09/political-collapse-the-center-cannot-hold/?fbclid=IwAR1vtKA0OICWXwUzFRLA- jcb7obqet5h2BpazHFDTvcqsRGQv7vM8Cs-hEoM

12.3. Specific and National Threat Assessments/Threat Warnings

February 2020 Alerts. Crisis Watch. Tracking Conflict Worldwide.International Crisis Group, February 2020. URL: https://mailchi.mp/crisisgroup.org/new-crisiswatch-alerts-for-february-january-trends-and-updates- on-80-conflicts?e=f3ee1ca51c A. Woodward. FBI raises neo-Nazi threat level to same as ISIS. The Independent, February 7, 2020. URL: https:// www.independent.co.uk/news/world/americas/fbi-neo-nazi-isis-us-terror-threat-level-trump-a9323786.html C. Clarke. Terrorism revisited. The threat today. The Big Bid Theory, 2019. URL: https://www.spreaker.com/ user/thebigbidtheory/terrorism-revisited-the-threat-today-colin-clarke L. Baldor. Top commander sees increased Iran threat in Afghanistan. Associated Press, January 31, 2020. URL: https://www.yahoo.com/news/top-commander-sees-increased-iran-121257788.html Twenty-fifth report of the Analytical Support and Sanctions Monitoring Team submitted pursuant to Reso- lution 2368 (2017) concerning ISIL (Da’eash) and al-Qaida and associated individuals and entities. UN Se- curity Council, S/2020/53, January 20, 2020. URL: https://www.un.org/en/ga/search/view_doc.asp?symbol- =S/2020/53 UN chief warns of ‘four horseman’ global threats. Hurriyet Daily News, January 24, 2020. URL: http://www. hurriyetdailynews.com/un-chief-warns-of-four-horsemen-global-threats-151315 M. Hodge. US troops in Germany face ‘imminent’ attack by ‘jihadi from Jordan’, intelligence warns. The Sun, January 19, 2020. URL: https://www.thesun.co.uk/news/10775097/us-troops-germany-terror-attack-jordan/ GardaWorld launches its 2020 global travel security and kidnap & maritime piracy risk maps and reports. Garda World Security, January 17, 2020. URL: https://www.newswire.ca/news-releases/gardaworld-launch- es-its-2020-global-travel-security-and-kidnap-amp-maritime-piracy-risk-maps-and-reports-843912136.html B. Hoffman, J. Ware. Top conflicts to watch in 2020: a mass casualty attack on the United States or a Trea- ty Ally. Council on Foreign Relations, January 16, 2020. URL: https://www.cfr.org/blog/top-conflicts-watch- 2020-mass-casualty-terrorist-attack-united-states-or-treaty-ally?utm_medium=social_owned&utm_cam- paign=pps-2020&utm_content=011619&utm_source=fb&fbclid=IwAR1enN1Zdu4bLC5s9L69NzBiPrXJ- d6udkdLY14UkHi5r7E_mBDNATdKV T. Durden. DHS warns female suicide bomber ‘of Middle Eastern descent’ being smuggled into the US with- in days. ZeroHedge, January 10, 2020. URL:https://www.zerohedge.com/political/border-patrol-alerted-fe- male-suicide-bomber-middle-eastern-descent-being-smuggled-us G. Fay Cashman. Rivlin: whoever leads next government needs to know how to handle Iran. The Jerusalem Post, January 6, 2020. URL: https://www.jpost.com/Middle-East/Rivlin-Whoever-leads-next-gov-needs-to- know-how-to-handle-Iran-613282 Y. Jeremy Bob. Prepare for potential broad war between Iran and US – INSS annual report. The Jerusalem Post, January 6, 2020. URL: https://www.jpost.com/Middle-East/Prepare-for-potential-broad-war-between-Iran- and-US-INSS-annual-report-613263

ISSN 2334-3745 188 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

J. Ari Gross. Top Israeli think tank warns: potential for war with Iran is growing. The Times of Israel, January 6, 2020. URL: https://www.timesofisrael.com/top-israeli-think-tank-warns-potential-for-war-with-iran-is- growing/ US embassy in Israel warns of rocket attacks after Soleimani slaying. The Times of Israel, January 6, 2020. URL: https://www.timesofisrael.com/us-embassy-in-israel-warns-of-rocket-attacks-after-soleimani-slaying/ National Terrorism Advisory System Bulletin. Homeland Security, January 4, 2020. URL: https://www.dhs.gov/ ntas/advisory/national-terrorism-advisory-system-bulletin-january-4-2020?fbclid=IwAR2P7uCcu2fowuMP- jkKdoL2yVQGQiOlMnqRp6oeHfR5Jep8Doqr_6WpprRM

12.4. Forecasts, Trends

Munich Security Report 2020. Westlessness. February, 2020. URL: https://securityconference.org/en/publica- tions/munich-security-report-2020/ T. Sweijs, D. Pronk. Strategic Monitor 2019-2020. Between order & chaos: the writing on the wall. The Clingendael Institute/The Hague Center for Strategic Studies, January 2020. URL: https://www.clingendael.org/publication/ strategic-monitor-2019-2020?utm_source=Newsletter+Clingendael&utm_campaign=c88cb30ef4-&utm_me- dium=email&utm_term=0_ec8de12e45-c88cb30ef4-79915549 S. Stewart, T. Abi-Hanna. The global jihadist movement in 2020: the threat lens forecast.Stratfor, January 28, 2020. URL: https://worldview.stratfor.com/article/global-jihadist-movement-2020-threat-lens-forecast M. Pavlik. Ten conflicts to worry about in 2020. ACLED, January 23, 2020. URL: https://www.acleddata. com/2020/01/23/ten-conflicts-to-worry-about-in-2020/ The global risks report 2020.World Economic Forum, January 15, 2020. URL: https://www.weforum.org/re- ports/the-global-risks-report-2020 T. Durden. Davos elites warn ‘climate action failure’ biggest global risk in 2020. ZeroHedge, January 20, 2020. URL: https://www.zerohedge.com/geopolitical/davos-elites-warn-climate-action-failure-biggest-global- risk-2020 The world in 2020.ISPI, January 2020. URL: https://essay.ispionline.it/?page_id=1686 C.P. Clarke. Trends in terrorism: what’s on the horizon in 2020. Foreign Police Research Institute, January 2, 2020. URL: https://www.fpri.org/article/2020/01/trends-in-terrorism-whats-on-the-horizon-in-2020/? B. Johnson. Six terrorism trends to watch in 2020. Homeland Security Today, January 11, 2020. URL: https:// www.hstoday.us/subject-matter-areas/infrastructure-security/6-terrorism-trends-to-watch-in-2020/ IntelBrief: five geopolitical trends to watch in 2020.The Soufan Center, January 7, 2020. URL: https://thesou- fancenter.org/intelbrief-5-geopolitical-trends-to-watch-in-2020/ A. Cuthbertson. What will the world look like in 2030? The Independent, January 4, 2020. URL: https://www. independent.co.uk/independentpremium/long-reads/future-world-prediction-tech-2030-robots-5g-ai-cryp- tocurrency-a9266266.html

ISSN 2334-3745 189 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

13. Also Worth Reading/Watching B. Freeman. Foreign funding of think tanks in America. Center for International Policy, January 2020. URL: https://static.wixstatic.com/ugd/3ba8a1_4f06e99f35d4485b801f8dbfe33b6a3f.pdf S. Coughlan. Dissatisfaction with democracy ‘at record high’. BBC, January 29, 2020. URL: https://www.bbc. com/news/education-51281722?fbclid=IwAR2XsLZ6hV_YSx-OrlOZUwynNEddqf4QCC5qxeZnuo3uSAH- D5Qp_aixHEb4 Yuval Noah Harari & Tristan Harris: ’Truth decay and the technology threat’. Yuval Noah Harari, YouTube, January 27, 2020. URL: https://www.youtube.com/watch?v=FluIi30nzjE G. Braden. Vital discoveries that help us discover who we really are. Gregg Braden Official,YouTube , January 28, 2020. URL: https://www.youtube.com/watch?v=re-ifzWsMoM Yuval Noah Harari. How to survive the 21st century. Davos2020. YouTube, January 24, 2020. https://www.you- tube.com/watch?v=gG6WnMb9Fho Data Science Trends for 2020. Data science is everywhere now. What can we look forward in 2020? To- wardsdatascience, December 27, 2019. URL: https://towardsdatascience.com/data-science-trends-for-2020- 78bda13032c7

About the Compiler: Berto Jongman is Associate Editor of ‘Perspectives on Terrorism’. He is a former senior Military Intelligence Analyst and currently serves as International Consultant on CBRN issues. A sociologist by training, he also worked for civilian Swedish and Dutch research institutes. Drs. Jongman was the recipient of the Golden Candle Award for his World Conflict & Human Rights Maps, published by PIOOM. He is editor of the volume ‘Contemporary ’ (1996) and has also contributed to various editions of ‘Political Terrorism’, the award-winning handbook of terrorism research, edited by Alex P. Schmid.

ISSN 2334-3745 190 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

60+ Full-Text Academic Theses (Ph.D. and M.A.) on Terrorism, Violent Extremism, and Nationalism written in English between 2000 and 2020 Compiled and selected by Brody McDonald

Abstract: This bibliography contains Doctoral Dissertations (Ph.D.) and Master Theses (M.A.) on issues relating to national liberation, secessionism, terrorism and extremism. Titles were retrieved manually by searching the Open Access Theses and Dissertations Database (OATD), using various combinations of search terms, including – but not limited to – ‘Terrorism’, ‘Violent Extremism’, ‘Nationalism’ and ‘Secessionist’. More than 800 entries were evaluated, of which 63 were ultimately selected for this list. All theses are open source. However, readers should observe possible copyright restrictions. The title entries below are hyperlinked, or ‘clickable’, allowing access to full texts. Keywords: bibliography, theses, nationalism, national liberation, secessionism, terrorism, violent extremism, political violence

Bibliographic entries are divided into the following sub-sections: 1. Terrorist Organizations and National Identity 2. Representations of Terrorism, Violent Extremism, and Nationalism

1. Terrorist Organizations and National Identity Bergh, Viveka. Hizbullah’s Construction of National Identity: “We are in principle not like Others”. M.A. Thesis, Uppsala University, 2015. URL: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-255701 Blessing, Jason A. From “Total Liberation” to “Phased Liberation”: Temporality and Identity in the Provisional IRA and Hamas. M.A. Thesis, Virginia Tech, 2013. URL:http://hdl.handle.net/10919/23235 Burke, Emily A. Historical Roots of Terrorism and Challenges to Turkey’s Territorial Sovereignty. M.A. Thesis, Naval Postgraduate School, 2014, URL: http://hdl.handle.net/10945/43883 Chaerudin, Asep. Countering Transnational Terrorism in Southeast Asia with respect to Terrorism in Indonesia and the Philippines. M.A. Thesis, Naval Postgraduate School, 2003. Naval Postgraduate School. URL: http://hdl. handle.net/10945/6226 Davis, Stephen. Cosmopolitans in Close Quarters; Everyday Life in the Ranks of Umkhonto we Sizwe (1961-Pres- ent). Ph.D. Dissertation, University of Florida, 2010. URL: http://ufdc.ufl.edu/UFE0041598 Del Villar, Erika Mae Lorenzana. Terror as a Social Movement Tactic: Applying the Multi-Institutional Politics Approach to the Case of the Group. M.A. Thesis, University of Connecticut, 2013. URL:https:// opencommons.uconn.edu/gs_theses/513 Dijken, Lara van. The Scottish National Liberation Army: Marzipan Gang or Real Terrorist Threat? A Case Study of the Scottish National Liberation Army and the Reasons why they did not become a large Terrorist Movement during the years 1979-1997. M.A. Thesis, Leiden University, 2016. URL:http://hdl.handle.net/1887/41449 Đorić Marija. Ideologically Motivated Extremism as a Generator of Political Violence. Ph.D. Dissertation, Uni- versity of Belgrade, 2013. URL: http://dx.doi.org/10.2298/BG20130712DJORIC

ISSN 2334-3745 191 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Duhart, Philippe Eugene. Between Ballots and Bullets: Armed Struggle and Peacemaking in Northern Ireland and the Basque Country. M.A. Thesis, University of California, Los Angeles, 2016. URL: http://www.escholar- ship.org/uc/item/4k77w1jm Duman, Gokhan. Political Terrorism: the Case of Turkey and Spain: Similarities and Differences. M.A. Thesis, Universitat Rovira I Virgili, 2014. URL: http://hdl.handle.net/10803/401814 Gensler, Luke John. Pots, Putty, and Wires: Croatian Separatist Terrorism and the Hijacking of TWA 355. M.A. Thesis, University of North Carolina, 2014. URL: https://cdr.lib.unc.edu/record/uuid:79f86eb6-6181-46df- b98e-21748a5a24a6 Gunn, Christopher. Secret Armies and Revolutionary Federations: The Rise and Fall of Armenian Political Vi- olence, 1973-1993. Ph.D. Dissertation, Florida State University, 2014. URL: http://purl.flvc.org/fsu/fd/FSU_ migr_etd-8996. Harris, Kimberly M. National Identity and Nationalism in the Speeches of Osama Bin Laden. M.A. Thesis, Uni- versity of Missouri – Columbia, 2007. URL: https://doi.org/10.32469/10355/6043 Iqbal, Khuram. Evolution of Suicide Terrorism: A Case Study of Pakistan. M.A. Thesis, Macquarie University, 2014. URL: http://hdl.handle.net/1959.14/1054978 Keister, Jennifer Marie. States within States: How Rebels Rule. Ph.D. Dissertation, University of California, 2011. URL: http://www.escholarship.org/uc/item/2bm3g35t Krahe, Tyler. A History of Violence: British Colonial Policing in Ireland and the Palestine Mandate. M.A. Thesis, West Virginia University, 2016. URL: https://researchrepository.wvu.edu/etd/6011 Lau, Wun Yin Wilson. Terrorism: A new Threat for Indonesia? An Analysis on the National Security of Indonesia in the post-Suharto Period. M.A. Thesis, Lingnan University, 2004. URL:http://commons.ln.edu.hk/pol_etd/6 Lin, Ho-Sheng. The Changing Policies Towards Southern and The Separatist Movement in Thailand. Ph.D. Dissertation. ICAPS, 2012, NSYSU. URL: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_et- d?URN=etd-0827112-105642 Marinello, Frank Charles. The Interaction of Civic Nationalism and Radical Islam: A Theoretical Examination and Empirical Analysis. M.A. Thesis, Virginia Tech, 2006. URL:http://hdl.handle.net/10919/32578 Masters, Daniel S. The Origin of Terrorist Threats: Religious, Separatist, or Something Else?M.A. Thesis, Univer- sity of North Carolina, 2008. URL: http://libres.uncg.edu/ir/uncw/f/mastersd2008-1.pdf McGuire, Brendan. Cooperative Security in the Context of Terrorism and Ethnic Separatism: an Analysis of Chi- nese Security Foreign Policy in Central Asia and Pakistan. M.A. Thesis, California State University, 2011. URL: http://hdl.handle.net/10211.9/900 Mikami, Nathan C. Among the Believers are Men: The Role of Religious-Nationalist Identity and Religious Litera- cy in Islamic State Recruitment Efforts in the West.Ph.D. Dissertation, Washington State University, 2019. URL: http://hdl.handle.net/2376/16750 Mohammad Aslam, Mohd Mizan. A Critical Study of Kumpulan Militant Malaysia, its Wider Connections in the Region and the Implications of Radical Islam for the Stability of Southeast Asia. M.A. Thesis, Victoria University of Wellington, 2009. URL: http://hdl.handle.net/10063/4205 Moran, James E. The United States and Yemen: Coin in the Absence of a Legitimate Government.M.A. Thesis, Naval Postgraduate School, 2011. URL: http://hdl.handle.net/10945/10610 Neilsen, Emily Hall. Manifestation of a Lack: Capitalism, Democracy, & the Christian Identity Movement. M.A. Thesis, Bowling Green State University, 2007. URL: http://rave.ohiolink.edu/etdc/view?acc_num=bg- su1182539482

ISSN 2334-3745 192 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Novo, Andrew R. On All Fronts: and the EOKA Insurgency, 1955-1959. Ph.D. Dissertation, University of Oxford, 2010. URL: http://ora.ox.ac.uk/objects/uuid:9fcd14f8-f60d-49b3-82b4-411e3370e890 Patra, Tapas. 9/11 and Islam: Terrorism, State Violence and Dialogue. Ph.D. Dissertation, University of New South Wales, 2017. URL: http://handle.unsw.edu.au/1959.4/58082 Rangiwananga, Melissa. Troubling Political Discourses of Terrorism: Responding to the Call of the Other. M.A. Thesis, Massey University, 2010, URL:http://hdl.handle.net/10179/14017 Reed, A.G. Understanding Conflict Dynamics: A Comparative Analysis of Ethno-Separatist Conflicts in -In dia and the Philippines. Ph.D. Dissertation, Utrecht University, 2013. URL: http://dspace.library.uu.nl/han- dle/1874/284731 Ricardo, David A. The Causes and Prospect of the Southern Philippines Secessionist Movement.M.A. Thesis, Naval Postgraduate School, 2003. URL: http://hdl.handle.net/10945/6213 Snell, Brandon Charles. The Origins of Ethno/National Separatist Terrorism: A Cross-National Analysis of the Background Conditions of Terrorist Campaigns. M.A. Thesis, Wright State University, 2009. URL: http://rave. ohiolink.edu/etdc/view?acc_num=wright1244481182 Snider, Joshua. Islamism and the Politics of Crisis Nationalism: The Case of Indonesia. Ph.D. Dissertation, Uni- versity of Newcastle, 2014. URL: http://hdl.handle.net/1959.13/1309834 Tellidis, Ioannis. Preventing Terrorism? Conflict Resolution and Nationalist Violence in the Basque Country. Ph.D. Dissertation, University of St Andrews, 2008. URL: http://hdl.handle.net/10023/426 Thorat, Dhanashree A.National Activism in Transnational Times a Study of Post-9/11 South Asian and South Asian American Works. M.A. Thesis, University of Florida, 2013. URL:http://ufdc.ufl.edu/UFE0045671 Truijens, T.S. Modernism, Terrorism and Resurrection: Sub-state Nationalism in Spain. M.A. Thesis, Leiden University, 2015. URL: http://hdl.handle.net/1887/32864 Turner, Carl Peter. How Terrorism Ends: a Comparative Conflict Analysis of Northern Ireland, the Basque Coun- try and Corsica. Ph.D. Dissertation, University of Hull, 2015. URL: http://hydra.hull.ac.uk/resources/hull:13768 Van Brakle, Mischelle. The Impact of Macro Level Grievance Resolution on Terrorism and Political Violence in South Africa. Ph.D. Dissertation, University of Maryland, 2012. URL: http://hdl.handle.net/1903/12794 Wright, Austin L. Essays on Insurgent Strategy. PhD Dissertation, Princeton University, 2016. URL: http://arks. princeton.edu/ark:/88435/dsp01zp38wg030

2. Representations of Terrorism, Violent Extremism, and Nationalism Alzubairi, Fatemah. The Role of Colonialism and Neo-Colonialism in Shaping Anti-Terrorism Law in Compara- tive and International Perspectives: Case Studies of Egypt and Tunisia. Ph.D. Dissertation, York University, 2017. URL: http://hdl.handle.net/10315/33509 Baker, Chuck. Shades of Intolerance: The Influence of Terrorism on Discriminatory Attitudes and Behaviors in the United Kingdom and Canada. Ph.D. Dissertation, Rutgers University, 2015. URL: https://rucore.libraries. rutgers.edu/rutgers-lib/47632/ Baum, Chris W. Nationalism in United States Foreign Policy in the Post 9/11 Era. M.A. Thesis, Portland State University, 2015. URL: https://pdxscholar.library.pdx.edu/open_access_etds/2531 Batainah, Heba. The Politics of Belonging in Australia: Multiculturalism, Citizenship and Islamophobia. M.A. Thesis, Australian National University, 2012. URL:http://hdl.handle.net/1885/117180

ISSN 2334-3745 193 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Brooke, Nicholas. The Dogs that didn’t Bark: Political Violence and Nationalism in Scotland, Wales and England . Ph.D. Dissertation, University of St. Andrews, 2016. URL: http://hdl.handle.net/10023/8079 Cannon, David. Northern Ireland and the Political Economy of Peace: Neo-Liberalism and the End of the Trou- bles. M.A. Thesis, University of Adelaide, 2011. URL:http://hdl.handle.net/2440/71835 Cobb, Sean Daren. A Shadow Underneath: The Secret History of Paranoia, Borders and Terrorism in Post- war American Literature and Film. Ph.D. Dissertation, University of Arizona, 2007. URL: http://hdl.handle. net/10150/195525 Conniry, Krystal Lynn. National Security, Mass Surveillance, and Citizen Rights under Conditions of Protracted Warfare. M.A. Thesis, Portland State University, 2016. URL:http://pdxscholar.library.pdx.edu/open_access_ etds/3204 Crisman-Cox, Casey. Three Essays on Government and Rebel Interactions. Ph.D. Dissertation, University of Rochester, 2016. URL: http://hdl.handle.net/1802/31481 Freeland, Benjamin John. Turbulent Priests and Millenarian Protest: Outside Voices of Religious Nationalism in Interwar Japan. M.A. Thesis, University of British Columbia, 2003. URL:http://hdl.handle.net/2429/14540 Gavin, Aaron. Militant Liberalism and Its Discontents: On the Decolonial Origins of Endless War. M.A. Thesis, Cornell University, 2017. URL: http://hdl.handle.net/1813/59058 Hislop, J. Macdougall. Spanish State Policy, Basque Nationalism and ETA Terrorism. M.A. Thesis, University of Alberta, 1995. URL: https://era.library.ualberta.ca/files/5712m905c Jannepally, Hariwardhan Reddy. The 2008 Mumbai Attack and Press Nationalism: A Content Analysis of Cover- age in the New York Times, Times of London, Dawn, and the Hindu. M.A. Thesis, Ohio University. URL:http:// rave.ohiolink.edu/etdc/view?acc_num=ohiou1283534128 Lagat, Ivan K. Remembering the 1998 Nairobi Terror Attack: Cultural and Trauma Memory and the Reconcil- iation of a Nation. Ph.D. Dissertation, University of East Anglia, 2014. URL: https://ueaeprints.uea.ac.uk/id/ eprint/52066/ Kenna, Shane. The Philosophy of the Bomb: the Dynamite Campaign and the British Counter Response, 1876-1885. M.A. Thesis, Trinity College, Dublin, 2011. URL:http://hdl.handle.net/2262/79074 Mauro, Aaron. Tragic America: Terror, Metaphor, and the Contemporary American Novel. M.A. Thesis, Queen’s University, 2012. URL: http://hdl.handle.net/1974/7236 McConaghy, Kieran. Terrorism and the State: Intra-State Dynamics and the Response to Non-State Terrorism . Ph.D. Dissertation, University of St Andrews, 2015. URL: http://hdl.handle.net/10023/6535 Norris, Maria. Contesting Identity and Preventing Belonging?: An Analysis of British Counter Terrorism Policy since the Terrorism Act 2000 and the Selective Use of the Terrorism Label by the British Government. Ph.D. Dis- sertation, London School of Economics, 2015. URL: http://etheses.lse.ac.uk/997/ Philipupillai, Gillian Geetha. The Marking of Tamil Youth as Terrorists and the Making of Canada as a White Settler Society. M.A. Thesis, University of Toronto, 2013. URL: http://hdl.handle.net/1807/42640 Pokalova, Elena. Shifting Faces of Terror after 9/11: Framing the Terrorist Threat. Ph.D. Dissertation, Kent State University, 2011. URL: http://rave.ohiolink.edu/etdc/view?acc_num=kent1322435499 Saksena, Ritu. Mapping Terrorism: Amorphous Nations, Transient Loyalties. Ph.D. Dissertation, University of Maryland, 2006. URL: http://hdl.handle.net/1903/3525 Sivaloganathan, Myra. Sri Lankan Discourses of Ethno-Nationalism and Religious Fundamentalism. M.A. The- sis, McMaster University, 2017. URL: http://hdl.handle.net/11375/22270

ISSN 2334-3745 194 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Smith, David Michael. Immigrants and Counterterrorism Policy: A Comparative Study of the United States and Britain. Ph.D. Dissertation, Northwestern University, 2013. URL: http://hdl.handle.net/2047/d20003066 Svensson, Emelie. Democratic Strength and Cowardly Barbarism?: A Discourse-Theoretic Study on the Gender- ing of Terrorism in the Swedish Political Discourse. M.A. Thesis, Swedish National Defence College, 2016. URL: http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6255 Zejdlova, Katerina. Weaponising Unresolved Pasts: The Impact of Victimhood Narratives on Societal Reconcil- iation in Spain and the Basque Country in the Aftermath of ETA. M.A. Thesis, Leiden University, 2019, URL: http://hdl.handle.net/1887/68654

About the Compiler: Brody McDonald is Assistant Editor with ‘Perspectives on Terrorism’. He is an Intercultural Fellow with the United Nations Alliance of Civilizations (UNAOC) and also a Member of the Canadian Network for Research on Terrorism and Society (TSAS).

ISSN 2334-3745 195 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Conference Monitor/Calendar of Events (February 2020 – May 2020) Compiled by Olivia J. Kearney

The Terrorism Research Initiative (TRI), in its mission to provide a platform for academics and practitioners in the field of terrorism and counter-terrorism, compiles an online calendar, listing recent and upcoming academic and professional conferences, symposia and similar events that are directly or indirectly relevant to the readers of Perspectives on Terrorism. The calendar includes academic and (inter-) governmental conferences, professional expert meetings, civil society events and educational programs. The listed events are organised by a wide variety of governmental and non-governmental institutions, including several key (counter) terrorism research centres and institutes. We encourage readers to contact the journal’s Assistant Editor for Conference Monitoring, Reinier Bergema, or Olivia Kearney, Editorial Assistant, and provide them with relevant information, preferably in the same format as the items listed below. Reinier Bergema can be reached at or via Twitter: @reinierbergema and Olivia Kearney can be reached at or via Twitter: @oliviajkearney.

February 2020

Preventing Violent Extremism in the Balkans and the MENA Center for European Policy Studies (CEPS) 3 February, Brussels, Belgium Website: visit | Twitter: @CEPS_thinktank

The Vicious Cycle of Islamophobia and Radicalisation University of Oslo – Center for Research on Extremism (UiO C-REX) 4 February, Oslo, Norway Website: visit | Twitter: @CrexUiO

A Book Talk with Joanna Cook - A Woman’s Place: U.S. Counterterrorism Since 9/11 George Washington Program on Extremism (GWPoE) 4 February, Washington (DC), United States Website: visit | Twitter: @gwupoe

Cyber Security Summit: Protect Your Business from Cyber Attacks Cyber Security Summit 5 February, Atlanta (GA), United States Website: visit | Twitter: @CyberSummitUSA

Iran: Beyond the Headlines Clingendael - Leiden University Centre for the Study on Islam and Society 5 February, Leiden, Netherlands Website: visit | Twitter: @Clingendaelorg

The Persistent Threat from the Islamic State and Al-Qaeda: The View from the UN The Washington Institute for Near East Policy 6 February, Washington (DC), United States Website: visit | Twitter: @WashInstitute

ISSN 2334-3745 196 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Edlis Neeson Great Decisions: Red Sea Security The Aspen Institute 6 February, Aspen (CO), United States Website: visit | Twitter: @aspeninstitute

Pakistan: The Changing Security Dimension Centre for Land Warfare Studies 7 February, Delhi, India Website: visit | Twitter: @OfficialCLAWSIN

Aaron Zelin and Rukmini Callimachi Book Launch: Tunisia’s Missionaries of Jihad The Washington Institute 11 February, Online Webcast Website: visit | Twitter: @WashInstitute

Joint Regional High-level Conference on “Foreign Terrorist Fighters” – Addressing Current Challenges Organization for Security and Co-operation in Europe (OSCE) 11 - 12 February, Hofburg, Vienna Website: visit | Twitter: @OSCE

The Middle East Post-Soleimani: An Intelligence Assessment Belfer Centre for Science and International Affairs 12 February, Cambridge (MA), United States Website: visit | Twitter: @BelferCenter

Iran: Propaganda and Perception 41 Years after the Revolution Atlantic Council 12 February, Washington (DC), United States Website: visit | Twitter: @AtlanticCouncil

Global Security and the US Chatham House 12 February, London, United Kingdom Website: visit | Twitter: @ChathamHouse

Understand the Cyber Threats Facing Your Business: 2020 Cyber Threat Landscape StaySafeOnline 13 February, Virtual Website: visit | Twitter: @StaySafeOnline

The Internet and AI: Security, Safety, and Governance Belfer Centre for Science and International Affairs 13 February, Cambridge (MA), United States Website: visit | Twitter: @BelferCenter

9th Annual Homeland Security Symposium & Expo: Tech Innovation and Homeland Security Center for American Studies 13 February, Newport News (VA), United States Website: visit | Twitter: N/A

ISSN 2334-3745 197 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Discussing the Middle East in English Center for Middle Eastern Studies (ORSAM) 15 February, Ankara, Turkey Website: visit | Twitter: @orsamtr

Munich Security Conference Institute for Strategic Dialogue (ISD) 15 - 17 February, Munich, Germany Website: visit | Twitter: @ISDGlobal

OSINT Workshop Bellingcat 17 – 21 February, Amsterdam, Netherlands Website: visit | Twitter: @bellingcat

Defector Militias as Tools of Social Fragmentation: Evidence from Ba‘thist Iraq and Sudan Center for International Security and Cooperation 18 February, Stanford (CA), United States Website: visit | Twitter: @FSIStanford

Islamist Terrorism in the UK: A Seminar by Raffaello Pantucci International Centre for Political Violence and Terrorism Research (RSIS) 18 February, Nanyang, Singapore Website: visit | Twitter: @RSIS_NTU

Open-Source Intelligence Summit SANS Institute 18 - 24 February, Alexandria (VA), United States Website: visit | Twitter: @SANSEMEA

Warkeeping: Intervention in Lebanon, 1982 - 1984 Belfer Centre for Science and International Affairs 20 February, Cambridge (MA), United States Website: visit | Twitter: @BelferCenter

The Human Hacking Conference StaySafeOnline 20 - 22 February, Buena Vista (FL), United States Website: visit | Twitter: @StaySafeOnline

The Bomb: Presidents, Generals, and the Secret History of Nuclear War New America 21 February, Washington (DC), United States Website: visit | Twitter: @NewAmerica

The European Union’s Foreign and Security Policy: Challenges for the Next Five Years GLOBSEC 24 February, Vienna, Austria Website: visit | Twitter: @GLOBSEC

ISSN 2334-3745 198 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Terrorism 101: What we have learned since 9/11? University of Maryland 27 February, Silver Spring (MD), United States Website: visit | Twitter: @bsosumd

On Dignity and Humiliation UiO Department of Psychology 27 February, Oslo, Norway Website: visit | Twitter: N/A

Tackling Extremism in the UK Conference: Prevention, Response, and Victim Support Westminster Insight 28 February, Central London, United Kingdom Website: visit | Twitter: @WMInsightUK

Strategy Building for Small States in European Security and Defence Institute of International & European Affairs (IIEA) 28 February, Dublin, Ireland Website: visit | Twitter: @IIEA

March 2020

OSINT Workshop Bellingcat 2 – 6 March, London, United Kingdom Website: visit | Twitter: @bellingcat

Terrorism Analyst Training Course 2020 International Centre for Political Violence and Terrorism Research (RSIS) 2 – 6 March, Nanyang, Singapore Website: visit | Twitter: @RSIS_NTU

Security Technologies in Weak States: How Security Technologies impact State-Society Relations Danish Institute for International Studies (DIIS) 3 March, Copenhagen, Denmark Website: visit | Twitter: @diisdk

Threat Financing and Emerging Risk START UMD 4 March, Baltimore (MD), United States Website: visit | Twitter: @START_UMD

CBRNe World Jakarta: Indonesia Security Landscape 4.0 CBRNe in association with HLS Indonesia 4 - 6 March, Jakarta, Indonesia Website: visit | Twitter: @cbrneworld

Security in a Post-Nuclear Age Center for International Security and Cooperation (CISAC) 5 March, Stanford (CA), United States

ISSN 2334-3745 199 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Website: visit | Twitter: @StanfordCISAC

Masterclass: Combatting Terrorism University of Cumbria 9 March, Lancaster, United Kingdom Website: visit | Twitter: @CumbriaUni

Prevention Work in Digital Living Environments: Islamist and Anti-Muslim Agitation as an Object of Digital Education and Online Streetwork Bundeszentrale für politische Bildung (BPB) 9 - 10 March, Kassel, Germany Website: visit | Twitter: @bpb_de

Cybersecurity for Small to Medium-Sized Governments: What You Should Know StaySafeOnline 10 March, Virtual Website: visit | Twitter: @StaySafeOnline

18 Years of Reconstruction: Lessons from the US Experience in Afghanistan, with John Sopko Syracuse University – Institute for Security Policy and Law 10 March, Syracuse (NY), United States Website: visit | Twitter: @StaySafeOnline

A Tale of Two START UMD 10 March, Baltimore (MD), United States Website: visit | Twitter: @START_UMD

Ethics on the Radar: Exploring the Relevance of Ethics Support in Counterterrorism Leiden University 12 March, Leiden, Netherlands Website: visit | Twitter: @ISGA_TheHague

21st Asian Security Conference: National Security and Defence Planning in an Era of Strategic Uncertainty Institute for Defence Studies and Analyses 12 – 13 March, New Delhi, India Website: visit | Twitter: @IDSAIndia

Joint Meeting RAN EDU and RAN LOCAL Radicalisation Awareness Network (RAN) 12 – 13 March, Brussels, Belgium Website: visit | Twitter: @RANEurope

Breakfast Briefing: UK Security Policy after Brexit Royal United Services Institute (RUSI) 18 March, London, United Kingdom Website: visit | Twitter: @RUSI_org

“75 Years of Freedom: where are we now?” Who guarantees the Freedom of Europe and what are the Current Threats? Atlantische Commissie 18 March, Utrecht, Netherlands

ISSN 2334-3745 200 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Website: visit | Twitter: @JongeAtlantici

Joint Meeting RAN YF&C and RAN C&N Radicalisation Awareness Network (RAN) 19 - 20 March, Brussels, Belgium Website: visit | Twitter: @RANEurope

Cyber Security Summit: Protect Your Business from Cyber Attacks Cyber Security Summit 20 March, Tampa (FL), United States Website: visit | Twitter: @CyberSummitUSA

ISA Annual Conference 2020 International Studies Association (ISA) 25 – 28 March, Honolulu (HI), United States Website: visit | Twitter: N/A

OSINT Workshop Bellingcat 30 March – 3 April, Berlin, Germany Website: visit | Twitter: @bellingcat

Professional Certificate in Countering Terrorism and Violent Extremism International Centre for Parliamentary Studies (iCPS) 30 March – 3 April, London, United Kingdom Website: visit | Twitter: @parlicentre

April 2020

Book Launch: Human Dignity and Human Security in Times of Terrorism TMC Asser Institute 7 April, The Hague, Netherlands Website: visit | Twitter: @TMCAsser

CVE in Practice: An Ecosystem Approach to Countering Violent Extremism in the United States START UMD 20 April, Baltimore (MD), United States Website: visit | Twitter: @START_UMD

Book Talk: “Your Sons Are at Your Service: Tunisia’s Missionaries of Jihad” The Washington Institute for Near East Policy 22 April, Online Webcast Website: visit | Twitter: @WashInstitute

11th Israeli Transportation Security Solutions Delegation Green Light 20 – 26 April, Eilat, Israel Website: visit | Twitter: @GreenLightLtd

ISSN 2334-3745 201 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

14th United Nations Congress on Crime Prevention and Criminal Justice United Nations Office on Drugs and Crime (UNODC) 20 – 27 April, Kyoto, Japan Website: visit | Twitter: @UNODC

Joint Meeting RAN H&SC and RAN POL Radicalisation Awareness Network (RAN) 25 - 26 March, Budapest, Hungary Website: visit | Twitter: @RANEurope

OSINT Workshop Bellingcat 27 April – 1 May, Toronto, Canada Website: visit | Twitter: @bellingcat

German Prevention Congress - DPT Deutscher Präventionstag 27 – 28 April, Kassel, Germany Website: visit | Twitter: @praeventionstag

May 2020

Dr. Joanna Cook, Women and Violent Extremism: Considering Contemporary Challenges Policing Institute for the Eastern Region 6 May, Chelmsford, United Kingdom Website: visit | Twitter: @AngliaRuskin

Terrorism Studies ‘20 / IV. International Conference on Terrorism and Political Violence DAKAM 8 May, Istanbul, Turkey Website: visit | Twitter: N/A

2020 Stockholm Forum on Peace and Development: The Geopolitics of Peacebuilding Stockholm International Peach Research Institute (SIPRI) 11 - 13 May, Stockholm, Sweden Website: visit | Twitter: @SIPRIorg

Dealing with Tensions, Crisis, and War in accordance with International Law and Humanitarian Principles International Society for Military Law and the Law of War (ISMLLW) 12 – 16 May, Aix-en-Provence, France Website: visit | Twitter: @ISMLLW

Counterterrorism and Intelligence Course – Applied Analysis on Compliance, Crime, and Wider Security Threats DAEL 13 - 15 May, The Hague, Netherlands Website: visit | Twitter: N/A

ISSN 2334-3745 202 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Developing Strategies for the Defeat of International Terrorism Counter Terror Expo 19 – 20 May, London, United Kingdom Website: visit | Twitter: @CTX_Event

Make Germany and Europe Safer! The Berlin Congress for Defensive Democracy 26 - 27 May, Berlin, Germany Website: visit | Twitter: N/A

Acknowledgements

Special thank goes out to Alex Schmid, Berto Jongman, Rebecca Mignot-Mahdavi, Jan Raudszus, Thomas Renard, Devorah Margolin, Donald Holbrook, and Matthew Levitt for their suggestions and contributions to this conference calendar.

About the Compiler: Olivia Kearney is a recent graduate of Leiden University’s Crime and Criminal Justice Masters Program. Following an internship with the International Centre for Counter-Terrorism – The Hague (ICCT), she now works as Research Assistant for NextGen 5.0. Her research interests include prison reform, rehabilitation, deradicalisation, C/PVE, counterterrorism, and game theory amongst others subjects.

ISSN 2334-3745 203 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Award for Best Ph.D. Thesis Submitted and/or Defended in 2019 31 March 2020 Deadline for Submissions Approaching Fast

The Terrorism Research Initiative (TRI) seeks to enhance the quality of research in the field of Terrorism Studies. For this purpose, TRI established in 2014 an Annual Award for the Best Doctoral Dissertation on Terrorism and/or Counter-Terrorism. Among the incoming submissions of Ph.D. theses, the TRI Award jury identifies three finalists and from these the winner. With the present announcement, a call is being made for sending to the jury Ph.D. theses submitted or defended at an academic institution in the calendar year 2019. Doctoral theses in the field of terrorism- and counterterrorism studies can be submitted either by the author or by the academic supervisor. Theses should be sent in electronic form as a Word document to the chairman of the jury at < [email protected] >, together with a cover letter (1-3 pp.), highlighting the merits of the submitted Ph.D. thesis. Submissions must be in English (or translated into English). The deadline for entries is 31 March, 2020. The TRI Award jury— consisting of Prof. Edwin Bakker, Prof. Clark McCauley, Prof. James Forest and Prof. em. Alex P. Schmid—will compare and evaluate the submissions, based on criteria such as originality in terms of introducing new data, theory or methodology, novelty and uniqueness of findings as well as degree of in- depth research. The chairman of the jury will inform the three finalists identified by the jury’s evaluation process before the end of July 2020. The winner among them will be announced during the summer of 2020 and can expect an Award of US $1,000, plus a Certificate of Achievement, signed by the chairman of the jury, acknowledging the granting of the TRI Thesis Award. The other two finalists will receive a Certificate of Achievement. For all three finalist theses, TRI will assist the authors in finding a publisher for their theses. The winner of the 2019 TRI Thesis Award will also be invited to submit an article for publication in an issue ofPerspectives on Terrorism, summarising the winning thesis’ main findings.

ISSN 2334-3745 204 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Words of Appreciation from Alex Schmid and James Forest Perspectives on Terrorism is entirely the product of volunteers – academics, professionals and practitioners – who for thirteen consecutive years have been giving their time and providing their expertise to keep this free and independent scholarly online journal alive and increasing in circulation to over 8,800 subscriptions today. While the main burden of producing six issues per year rests on the shoulders of the Editorial Team and those of the Editorial Board members who do most of the reviewing, there are many others who assist us in producing timely Articles and Research Notes six times a year. The more than a dozen members of the Editorial Team and the twenty-four Editorial Board members alone would not be able to handle and review the growing number of submissions that reach us now on an almost daily basis. We could not function without the selfless help of our esteemed external reviewers who read and critique the articles submitted to us. Once a year we wish to thank these anonymous reviewers publicly by listing here their names. For reviewing article submitted to Perspectives on Terrorism in 2019, we sincerely thank the individuals listed here: Max Abrahms, Amarnath Amarasingam, Tricia Bacon, J.M. Berger, Noemie Bouhana, Frank Bovenkerk, Neil Bowie, Cole Bunzel, Colin Clarke, Christina Cliff, Maura Conway, Luis de la Corte, O.; Shawn Cupp, Bert-Jan Doosje, Ken Duncan, Sajjan Gohel, Boaz Ganor, Michele Gropi, Rohan Gunaratna, Phil Gurski, William Hansen, Aaron Hoffman, Donald Holbrook, John Horgan, Lee Jarvis, Ely Karmon, Erin Kearns, Elisabeth Kendall, Ariel Koch, Daniel Koehler, Peter Lehr, Russell Lundberg, James Lutz, Leena Malkki, David Malet, Clark McCauley, Erin Miller, Assaf Moghadam, Feyyaz Muhammad, Sam Mullins, Andrew Mumford, Brigitte Nacos, Petter Nesser, Norris, Brian Nussbaum, Christophe Paulussen, Annelies Pauwels, Brian J. Phillips, Muhammad Rahim, Kumar Ramakrishna, Fernando Reinares, Tobias Risse, Peter Romaniuk, Thomas Samuels, Neo Loo Seng, Andrew Silke, Ekaterina Stepanova, Ian David Turner, Teun van Dongen, Carlos Vazquez, Fabian Virchow, Diane Webber, Doug Weeks, Daan Weggemans, Gabriel Weimann, James Wirtz, and Ahmet Yayla. THANK YOU, Peer Reviewers for Perspectives on Terrorism (2019)! We also wish to thank our not so anonymous regular members of the Editorial Board: Shazad Ali, Joost Augusteijn, Jeff Bale, Michael Boyle, Jarret Brachman, Richard J. Chasdi, James ‘Chip’ O. Ellis, Leah Farrall, Paul Gill, Jennifer Giroux, M.J. Gohel, Beatrice de Graaf, Thomas Hegghammer, Jeffrey Kaplan, Bradley McAllister, John Morrison, Assaf Moghadam, Sam Mullins, Brian J. Phillips, Thomas Riegler, Peter Romaniuk, Simon Shen, and Anne Speckhard. These members of the Editorial Board were approached most often and asked again and again to give us their professional assessment on the quality of submissions reaching our journal. And of course, our team of Associate Editors also served as peer reviewers many times throughout the year: Tore Bjørgo, Christine Boelema Robertus, Gregory Miller, John Morrison, Bart Schuurman, Rashmi Singh, and Aaron Y. Zelin. Thanks also go to our other Associate Editors, Assistant Editors and Editorial Assistants: Reinier Bergema, Berto Jongman, Brody McDonald, Ryan Scrivens, Joshua Sinai, Judith Tinnes, and Jodi Moore. They were also crucial in making our Resources Section what it is – an indispensable resource in the field of Terrorism Studies. Altogether, many authors submitting manuscripts have benefitted from the reviews, constructive criticism, editing, formatting and proof-reading provided by everyone listed above. Again, THANK YOU to all! Alex Schmid & James Forest (Editor-in-Chief & Co-Editor)

ISSN 2334-3745 205 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

About Perspectives on Terrorism

Perspectives on Terrorism (PoT) is a joint publication of the Terrorism Research Initiative (TRI), headquartered in Vienna, Austria, and the Institute of Security and Global Affairs (ISGA) of Leiden University, Campus The Hague. PoT is published six times per year as a free, independent, scholarly peer-reviewed online journal available at the following URL: https://www.universiteitleiden.nl/perspectives-on-terrorism. PoT has over 8,800 subscribers and seeks to provide a platform for established scholars as well as academics and professionals entering the interdisciplinary fields of Terrorism, Political Violence and Conflict Studies. The editors invite researchers and readers to: • present their perspectives on the prevention of, and response to, terrorism and related forms of violent conflict; • submit to the journal accounts of evidence-based, empirical scientific research and analyses on terrorism; • use the journal as a forum for debate and commentary on issues related to the above. Perspectives on Terrorism has sometimes been characterised as ‘non-traditional’ in that it dispenses with some of the rigidities associated with commercial print journals. Topical articles can be published at short notice and reach, through the Internet, a much larger audience than subscription-fee based paper journals. Our online journal also offers contributors a higher degree of flexibility in terms of content, style and length of articles – but without compromising professional scholarly standards. The journal’s Research Notes, Special Correspondence, Op-Eds and other content are reviewed by members of the Editorial Team, while its Articles are peer-reviewed by outside academic experts and professionals. While aiming to be policy-relevant, PoT does not support any partisan policies regarding (counter-) terrorism and waging conflicts. Impartiality, objectivity and accuracy are guiding principles that we require contributors to adhere to. They are responsible for the content of their contributions and retain the copyright of their publication. The Editorial Team of Perspectives on Terrorism consists of: Prof. em. Alex P. Schmid, Editor-in-Chief Prof. James J.F. Forest, Co-Editor M.Sc. Christine Boelema Robertus, Associate Editor for IT Prof. Gregory Miller, Associate Editor Dr. Rashmi Singh, Associate Editor Dr. Tore Bjørgo, Associate Editor Dr. John Morrison, Associate Editor Dr. Bart Schuurman, Associate Editor Dr. Aaron Y. Zelin, Associate Editor Dr. Joshua Sinai, Books Reviews Editor Dr. Judith Tinnes, Information Resources Editor Drs. Berto Jongman, Associate Editor for Web Resources, ISSN 2334-3745 206 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1

Drs. Reinier Bergema, Assistant Editor for Conference Monitoring Brody McDonald, Assistant Editor for Theses Ms. Olivia Kearney, Editorial Assistant Mrs. Jodi Moore, Editorial Assistant

ISSN 2334-3745 207 February 2020